"Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers"
"Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers"
According to new research, threat actors can use the DOS-to-NT path conversion process to achieve rootkit-like capabilities and conduct malicious activities such as concealing and impersonating files, directories, and processes. According to SafeBreach security researcher Or Yair, the DOS path at which the file or folder exists is converted to an NT path when a user executes a function with a path argument in Windows. During the conversion process, a known issue occurs: the function removes trailing dots from any path element and trailing spaces from the last path element.