Reply to post: Re: For those that missed it in the article....

Windows Registry-infecting malware has no files, survives reboots

Ken Hagan Gold badge

Re: For those that missed it in the article....

"Why the fuck is it possible for a word processing document to reach that deeply into the registry and affect those changes?"

Because the luser in question has loaded that document from their admin account, like everything else that they do. Sane Windows users will probably find that they are immune because the malware authors didn't bother to include a privilege escalation attack in the WORD payload.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon