
While password hashes are submitted, the researchers note that cracking those passwords should not take decades anymore unless they are of the complex kind.


What happens then is that the server requests authentication, and that the system will provide that. The attackers use a SMB server location for the icon. This means that attackers could easily hide the file behind a disguised filename such as image.jpg. What's particularly interesting about the format is that it may load resources from a remote server.Įven more problematic is the fact that Windows will process these files as soon as you open the directory they are stored in, and that these files appear without extension in Windows Explorer regardless of settings. The aging format is a plain text file that includes instructions, usually an icon location and limited commands. The new attack, described in detail on the Defense Code website, combines Chrome's automatic download behavior with Windows Explorer Shell Command File files that have the. Chrome users who want to pick the download folder instead for downloads need to change that behavior in the options. It is configured to download safe files automatically to the user system without prompt by default.Īny file that Chrome users download that passes Google's safe browsing checks will land in the default download directory automatically. The Chrome browser is the most popular browser right now on desktop devices.
