Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Windows Vulnerability found in your Calculator? Here’s What You Should Know

A Windows Vulnerability found in your Calculator? Here’s What You Should Know

Sometimes security breaches and hacking attacks come from the most unlikely of sources, even going so far as to utilize trusted applications to infect an endpoint or network. This is the case with a new phishing attack which uses the Calculator application that comes built-in with Windows in a very creative way. This is just one example of how hackers have been forced to innovate to combat the increasingly secure systems which businesses and users rely on today, and it should be a testament as to why you can never be too careful.

What is the Threat?

A security researcher who goes by ProxyLife on Twitter has reportedly discovered that there are several strains of malware and phishing attacks utilizing an outdated version of Microsoft’s Calculator application to find their way onto your network and launch their attacks—specifically the Windows 7 version of Calculator. The way that it works is that a cybercriminal tricks the user into downloading an ISO disc image which is disguised as a PDF or other similar file. This ISO contains a shortcut to an opened version of the Calculator application.

The Windows 7 Calculator can use what are called Dynamic Link Libraries in the same folder rather than defaulting to Windows’ system default libraries. The Calculator then runs the library, which is infected with malware. Later versions of Calculator do not have this capability, hence why an older version is necessary. Since Windows thinks that Calculator is a legitimate application, opening it in this way doesn’t set off any red flags within the system.

Should You be Worried?

At the end of the day, this is largely an obscure threat that sees hackers using the tools at their disposal in creative and different ways. It is not yet known if Microsoft has issued an update to Defender to put a stop to these types of attacks, but the long and short of it is that you probably won’t encounter this specific threat, as long as you are using proper security practices while browsing the Internet or checking your email.

Still, the idea that threats can use trusted and known applications in this way can make things a bit of a hassle for your IT team. These types of attacks might bypass the defenses built into your operating systems, but they can be caught if you are proactively monitoring your infrastructure for abnormalities. These abnormalities can then be contained, isolated, and eliminated. Of course, the problem here is that you likely wouldn’t find this type of threat if you weren’t actively looking for it—which is where we come in.

Proactively Monitor Your Network with Our Services

We know that it can be a challenge to keep your network safe. That’s why we make it easy with our remote monitoring services. Combined with comprehensive security solutions like a firewall, antivirus, spam blocker, and content filter, you’ll find that your network has never been safer. To learn more about what we can do for your business, contact us today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 01 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Google Phishing Workplace Tips Computer IT Services Hosted Solutions Users Collaboration Mobile Device Ransomware Quick Tips Small Business Cybersecurity Microsoft Workplace Strategy Data Backup Passwords Communication Smartphone Backup Saving Money VoIP Business Management Smartphones Android Mobile Devices communications Upgrade Disaster Recovery Browser Managed Service Data Recovery Social Media Managed IT Services Microsoft Office Windows Tech Term Network Remote Internet of Things Facebook Current Events Productivity Automation Artificial Intelligence Cloud Computing Covid-19 Miscellaneous Gadgets Remote Work Server Managed Service Provider Holiday Information Outsourced IT Encryption Spam AI Employee/Employer Relationship Windows 10 Compliance Government Training Office Business Continuity Data Management Virtualization Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Data Security Apps Two-factor Authentication Mobile Office App Employer-Employee Relationship Vendor Chrome Mobile Device Management Budget Gmail Managed Services Voice over Internet Protocol Apple Networking How To WiFi BDR BYOD Computing Information Technology Hacker Access Control Avoiding Downtime Applications Office 365 Marketing Tip of the week Conferencing Healthcare Big Data Operating System Risk Management Virtual Private Network Computers HIPAA Router Health Analytics Website Office Tips IT Support Augmented Reality Retail Help Desk Storage Password Bring Your Own Device Managed IT Services The Internet of Things Telephone Social Going Green Patch Management Save Money Cooperation Free Resource Remote Monitoring End of Support Project Management Vulnerability Windows 7 Vendor Management Cybercrime Microsoft 365 Customer Service Display Solutions Printer Paperless Office Infrastructure Windows 11 Document Management Monitoring 2FA Firewall Excel Scam Data loss Remote Workers Downloads iPhone Licensing Robot Vulnerabilities Entertainment Data Privacy Settings Wireless Printing Content Filtering Images 101 IT Management Customer Relationship Management YouTube Meetings Telephone System Multi-Factor Authentication Mobility VPN Physical Security Cost Management Cryptocurrency Hacking Presentation Computer Repair Virtual Desktop Employees Integration Data storage LiFi Wireless Technology User Tip Modem Mobile Security Outlook Processor Machine Learning Money Holidays Humor Word Data Storage Smart Technology Supply Chain Video Conferencing Maintenance Sports Managed Services Provider Antivirus Professional Services Mouse Saving Time Virtual Machines Safety Managed IT Service Administration Download Net Neutrality Alerts SQL Server Technology Care Best Practice Alert Buisness File Sharing Dark Data Financial Data History Business Communications Managed IT Break Fix Scams Legal IT solutions How To Browsers Smartwatch Connectivity IT Upload Procurement Azure Hybrid Work Business Growth Notifications Travel Application Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Techology Google Maps Cortana CES IoT Communitications Trends Supply Chain Management Alt Codes IBM Downtime Unified Threat Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Unified Threat Management Hosted Solution Data Analysis Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Typing Network Congestion Organization Social Networking Legislation Shortcuts Ransmoware Google Drive User Error Competition Knowledge Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Wearable Technology Memory Vendors Point of Sale 5G Health IT Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Google Docs Unified Communications Experience Directions Videos Assessment Electronic Health Records User Wasting Time Threats Bitcoin Network Management Running Cable Tech Support Monitors Trend Micro Specifications Security Cameras Workplace Strategies Google Wallet Internet Exlporer Software as a Service Fraud Meta Microchip Username Managing Costs Amazon Windows 8 IP Address Laptop Websites Black Friday SSID Drones eCommerce Database Surveillance Virtual Assistant Outsource IT SharePoint Electronic Medical Records Halloween Recovery IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Lenovo Hard Drives Writing Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Domains Virtual Reality Scary Stories Private Cloud Mirgation Hypervisor Displays Hacks Server Management PowerPoint Superfish Identity Theft Refrigeration Fun Shopping Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing Deep Learning Public Speaking Twitter Error Management PCI DSS Chatbots Navigation Lithium-ion battery Distributed Denial of Service Workplace Education Social Engineering Gig Economy Entrepreneur Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Remote Computing Regulations Compliance Identity Evernote Paperless Mobile Computing Co-managed IT Tablet Undo Search Bookmark Smart Tech Memes

Blog Archive