New
#11
UAC is superficial. I thought it was a good layer of protection until I started learning about it. Among the security community it's a bit of a joke from what I could see. It's more to protect the user from themselves as opposed to being a superior layer of protection. All you need to do is run malware from a process that user thinks is trusted. That could be a fake update executable for example which runs code with administrator priveleges once the user runs through the UAC process. You can also get malware to run with priveleges without even triggering the UAC process. There are simple commands you can fire off in Powershell which get the job done and we're not talking endless amounts of code, we are talking a one liner. AV does tend to pick up on Powershell scripts these days as it's often used to compromise a system but that's when you run scripts through trusted programs which have their own certificates that Windows trusts.
Also you have to remember most users want to be an administrator on their own computer because this gives them all the control they need. Sounds good but all that power and control is what is often exploited by bad guys. Linux for example saw this as a security threat waiting to happen and so you'll find upon running a Linux distro administration priveleges are compartmentalized as best as possible. You can be a user with sudo priveleges (the same as being an admin on Windows) but not have full reign over the system ALL OF THE TIME without confirming your identity each and every time. After a while you have to provide your password to sudo. The admin account (root) is seperate to everything else and is rarely logged into unless specific admin tasks need to be performed. You will usually find the root account is used sparingly. With Windows the root account is active 24/7 if you are an administrator. There is no 'on' and 'off' switch. You're either admin and running full priveleges, or you're not. This presents a serious security threat in and of itself because you leave the door wide open if the account is secured, and so it's recommended your main account on Windows is a normal user. Whenever you need to do a task which requires administrative priveleges you can authorise it as and when necessary using a seperate admin account by providing the credentials on demand. This means that malware, if it's on your computer (before being executed), has to get admin priveleges. And when you're not an admin account by default, it has to go about adapting to the user environment and trying to sneak in. Malware can't migrate to a higher level process if at first it cannot even get admin priveleges to begin with. As a standard user there isn't much malware can do. If it can't get these priveleges it cannot gain control over the system as easily.
So the whole UAC thing is flawed to begin with because if you're always in an administrator account, UAC is merely a very small and insignificant wall to climb over if you are malware because the environment is ready to be exploited.