Leave a comment

Comments 2

kellic May 21 2011, 18:48:01 UTC
*shrugs* Which becomes a nonissue if you aren't running with admin creds which Windows 7 shouldn't be. I've been running as a power user for the better part of 5 months now and only once have I had to give my account admin rights because windows was upchucking on doing something through the normal elevated credentials process. (It was adding a network printer. For some reason the system REFUSES to check Windows Update for a driver without admin rights ( ... )

Reply

praecorloth May 21 2011, 19:39:46 UTC
In theory? Yes. But to be able to do it across all user accounts on the system and persist over reboots, no, not even in Windows. Not without installing or inserting itself in to the system at some level so that Windows will automatically run the exe on start up. Read: A system level change that the default level of UAC is supposed to stop.

I can guess a lot of things about the trojan in this particular example. However a better example is the real one that hit my company a month or two back. That one installed a key logger on to the system, with none of the users hit running as admin.

Reply


Leave a comment

Up