Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security Operating Systems Software Windows

Tricking Vista's UAC To Hide Malware 221

Vista's User Account Control, love it or hate it, represents a barrier against unwanted software getting run on users' computers. A Symantec researcher has found a simple way to spoof UAC and says that it shouldn't be completely trusted. The trick is to disguise the UAC warning dialog in the color associated with alerts generated by Windows itself.
This discussion has been archived. No new comments can be posted.

Tricking Vista's UAC To Hide Malware

Comments Filter:
  • paraphrase (Score:2, Interesting)

    by physicsboy500 ( 645835 ) on Monday February 26, 2007 @08:54AM (#18151684)

    I love Microsoft's response:

    Meh... the same users who show enough common sense to click on the "you've won a free ipod enter your credit card information here" will obviously be able to know the difference between a good system message and a bad system message

    Hooray for apathy!

  • by Chrisq ( 894406 ) on Monday February 26, 2007 @08:54AM (#18151688)
    Basically its a way to get a green pop-up, which usually means safe applications. It relies on the user blindly saying "yes" to these green pop-ups
  • Different colors?? (Score:5, Interesting)

    by drawfour ( 791912 ) on Monday February 26, 2007 @08:58AM (#18151712)
    While it may be true that different colored borders are supposed to mean varying levels of "trust", as in what component is running, I don't think any user would know that. The text in the dialogs doesn't appear to be different (that I can tell), so why would a border color make me go "Oh, I should let that action happen, I bet that's some Control Panel action", especially when I wasn't working with the control panel.

    To be honest, Vista's UAC saved my butt recently. I have no idea what application was vulnerable -- but it somehow tried to run exec.exe, which was downloaded into one of my temp folders. The file was deleted after it failed to run (because I said "no"), and then would appear back in a few seconds and try to run again. I'm happy that whatever application was vulnerable wasn't able to do anything to my system.

    <tangent> Anyway, while some people may say it's annoying, I'm not sure exactly how many actions a typical user would take that would require UAC prompts. After the first few days of configuring, installing apps, etc..., I have little need to do anything that requires UAC prompts. Defrag is set up to run every night, anti virus is set up to download updates, my resolution settings don't change, etc... </tangent>
  • Re:Importance? (Score:4, Interesting)

    by gunnk ( 463227 ) <{gunnk} {at} {mail.fpg.unc.edu}> on Monday February 26, 2007 @09:40AM (#18152026) Homepage
    What I want to know is if the system can't tell that *I* double-clicked on an icon to start a program, how does the system know that *I* clicked "Allow"?

    If I had to enter my password to continue I would understand the difference, but just a click to continue? Does this work at all?
  • Re:Importance? (Score:4, Interesting)

    by MrNonchalant ( 767683 ) on Monday February 26, 2007 @09:46AM (#18152098)
    The environment you click that button in is a separate and theoretically secure desktop. That's why the screen dims: to indicate that. It's the same armor that protects your Windows password from keyloggers. Whether or not it's secure remains a largely open question. There are no exploits I've heard of to breach it, and Microsoft would (eventually) patch said exploits if they became apparent.
  • by POTSandPANS ( 781918 ) on Monday February 26, 2007 @09:52AM (#18152158)
    After using vista for about an hour on a customer's computer, I was pretty much trained to click yes on all those things too.


    The problem is that while we may actually read those warnings, most users are going to see it as an extra step they need to do in order to get their free ipod/car/vacation/porn. It wouldn't surprise me if directions to help users "get rid of those annoying uac popups permanently" soon show up on a few malware-providing websites. Just look at the firewall rule set on some people's computers.

  • by JackPT ( 1068740 ) on Monday February 26, 2007 @01:01PM (#18154544)
    My problem with UAC is that I bought a new computer recently, with Vista pre-installed and during the initial setup it prompted me to create a user account. The user account had full admin privileges. I immediately set up a lower privilege account for general webbrowsing etc, and when using that account not only do I have UAC confirmation messages, but I also have to enter a password. That is a good thing - rather like 'su' in Unix like operating systems or Ubuntu's locked screed admin method. Users just aren't going to realise the importance of what they're doing with just binary yes or no security questions. If anything with the initial account defaulting to admin, Pavlov's dog like, they're going to be conditioned to hit yes without thinking. People aren't paranoid even though people are out to get them.

    To rectify this problem Microsoft should make it clear during installation that the initial admin account shouldn't be used as the main account. This is not clear during the installation.

    Good things:

    - Internet Explorer's protected mode.
    - Making sure the heap is in a different place on each computer.
    - UAC is good for experienced or computer literate users (nobody else.

    Bad things:

    - UAC, in its present form, is just training computer illiterate people to click yes. There is an emphasis with a consumer operating system to educate the user. Not necessarily enforce (that would restrict freedom) but it should educate. All or nothing is not good.
    - Idiot reviewers thinking that an operating system is the largest contributory factor in the speed of a computer. Saying Vista is faster than XP when it's been run on a new, much faster computer, is a little like trading a saloon car for an Aston Martin and saying that the Aston Martin is faster because of the upholstery.

2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League

Working...