The introduction of AtomBombing in cyberspace: should Windows OS users worry?

by Julie Splinters - -

It is already a common sense that Windows OS users are a preferred target for cyber criminals. Every hour, every minute they construct new cyber deception and hacking techniques. As a result, it was only a matter of time when the crooks would strike the virtual community with heavy artillery. Likewise, AtomBombing was devised. IT professionals express their concerns as this code injection technique causes devastating effects on any Windows system. So is it the time to worry or is it only smoke without fire?

Looking from a positive perspective, the IT professionals were able to get a sight of this menacing technique before it was launched on a massive scale. According to their reports, the essence of this terrifying technique lies in its vital ability to avoid the detection of security tools. Instead of exploiting system vulnerabilities, the malware targets the Windows OS designing peculiarity. Whether you run Windows XP or Windows 10, you might be targeted by this destructive technology. Specifically, AtomBombing exploits the incorporate feature of Windows, particularly, Atom tables, to implement the attack. 

Specifically, atom tables keep strings and corresponding identifiers of the existing applications. What is more, they can be used for different purposes. DDE (Dynamic Data Exchange) programs exploit this technique to share item-name and topic-name strings with other programs. In other words, by meddling with these settings, AtomBombing hijack technology obtains the status of a legitimacy. Since its commands are regarded as legitimate processes, it can bypass anti-virus detection tools. Furthermore, it has been revealed that by running commands of GlobalAddAtom and GlobalGetAtomName, the technology is able to clean the evidence of hijacked threats in the targetted processes.

The outcomes of AtomBombing might be severe

Due to this technology, the cyber criminals are able to perform MITM (man-in-the-middle) browser assaults, take screenshots of the infected device and even steal the passwords of your personal accounts, including a bank account. All this activity is disguised as usual Windows OS processes. Such findings are certainly not reassuring and might cause great concerns for some users. Though at the moment there is no counterattack strategy against AtomBombing, there are some positive signs. The early detection of such terrifying technique will help the IT specialists to invent confronting measures. Likewise, Microsoft authorities are also expected to release the improved or even altered versions of Windows 10 to help the users dodge the attacks of cyber criminals.

About the author

Julie Splinters
Julie Splinters - Malware removal specialist

Julie Splinters is the News Editor of 2-spyware. Her bachelor was English Philology.

Contact Julie Splinters
About the company Esolutions


Files
Software
Compare
Like us on Facebook