![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisO0rAZ34PYmseKtEE9ec5ecQeyqRe5hvp-MnOE5tiLeHTcfv9f65OzwGgvU01HsHuMdWtD6XOCGaf3tvLlQpqLrmOv2HyxRsJOZ02S1PMnE1ItS3GuOpc9R1g20o0k1R5zIJD9zusimwxXscz8sjDEZNVVwUYK3kxVR2vcvuCYB8RJUeg7yUy8AD5yode/s1600/rootkit.png)
New research has found that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes.
“When a user executes a function that has a path argument in Windows, the DOS path at which the file or folder exists is converted to an NT path,” SafeBreach security researcher Or Yair said&
Source:: The Hackers News