anandk
Distinguished Member
"A Web application developer has uncovered a two-step process (PDF) for exploiting Windows Vista's User Account Control, essentially by having a Trojan piggyback on what could be a legitimate download...
...the vulnerability uses a two-part attack vector against a default Vista installation. The first step requires that malware called a proxy infection tool be downloaded and run without elevation. That software can behave as the victim expects it to while it sets up a second malicious payload in the background..."
source
whitepaper
...the vulnerability uses a two-part attack vector against a default Vista installation. The first step requires that malware called a proxy infection tool be downloaded and run without elevation. That software can behave as the victim expects it to while it sets up a second malicious payload in the background..."
source
whitepaper