Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Windows Vulnerability found in your Calculator? Here’s What You Should Know

A Windows Vulnerability found in your Calculator? Here’s What You Should Know

Sometimes security breaches and hacking attacks come from the most unlikely of sources, even going so far as to utilize trusted applications to infect an endpoint or network. This is the case with a new phishing attack which uses the Calculator application that comes built-in with Windows in a very creative way. This is just one example of how hackers have been forced to innovate to combat the increasingly secure systems which businesses and users rely on today, and it should be a testament as to why you can never be too careful.

What is the Threat?

A security researcher who goes by ProxyLife on Twitter has reportedly discovered that there are several strains of malware and phishing attacks utilizing an outdated version of Microsoft’s Calculator application to find their way onto your network and launch their attacks—specifically the Windows 7 version of Calculator. The way that it works is that a cybercriminal tricks the user into downloading an ISO disc image which is disguised as a PDF or other similar file. This ISO contains a shortcut to an opened version of the Calculator application.

The Windows 7 Calculator can use what are called Dynamic Link Libraries in the same folder rather than defaulting to Windows’ system default libraries. The Calculator then runs the library, which is infected with malware. Later versions of Calculator do not have this capability, hence why an older version is necessary. Since Windows thinks that Calculator is a legitimate application, opening it in this way doesn’t set off any red flags within the system.

Should You be Worried?

At the end of the day, this is largely an obscure threat that sees hackers using the tools at their disposal in creative and different ways. It is not yet known if Microsoft has issued an update to Defender to put a stop to these types of attacks, but the long and short of it is that you probably won’t encounter this specific threat, as long as you are using proper security practices while browsing the Internet or checking your email.

Still, the idea that threats can use trusted and known applications in this way can make things a bit of a hassle for your IT team. These types of attacks might bypass the defenses built into your operating systems, but they can be caught if you are proactively monitoring your infrastructure for abnormalities. These abnormalities can then be contained, isolated, and eliminated. Of course, the problem here is that you likely wouldn’t find this type of threat if you weren’t actively looking for it—which is where we come in.

Proactively Monitor Your Network with Our Services

We know that it can be a challenge to keep your network safe. That’s why we make it easy with our remote monitoring services. Combined with comprehensive security solutions like a firewall, antivirus, spam blocker, and content filter, you’ll find that your network has never been safer. To learn more about what we can do for your business, contact us today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 09 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Workplace Tips Privacy Google Email Computer Workplace Strategy Small Business Hosted Solutions Backup Collaboration Users Ransomware Managed Service AI Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Training Covid-19 Compliance Server IT Support Managed Service Provider Remote Work Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Vendor Wi-Fi Business Technology Bandwidth Windows 10 Data Security Managed Services Apps Two-factor Authentication Mobile Office App Voice over Internet Protocol Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi BDR HIPAA Computing Physical Security Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Password Managed IT Services How To Big Data Healthcare Operating System Router Virtual Private Network Risk Management Computers Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Bring Your Own Device 2FA Going Green Patch Management Social Save Money Remote Workers Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Free Resource Customer Service Project Management Display Printer Windows 7 Paperless Office Microsoft 365 Infrastructure Monitoring Solutions Document Management Managed IT Service Firewall Telephone Scam Windows 11 Data loss The Internet of Things Cooperation Excel Virtual Machines Professional Services Telephone System Robot Cost Management Settings Printing Wireless iPhone Content Filtering IT Management Customer Relationship Management VPN YouTube Meetings Vulnerabilities Data Privacy Cryptocurrency User Tip Modem Hacking Images 101 Processor Presentation Computer Repair Mobile Security Multi-Factor Authentication Mobility Virtual Desktop Data storage LiFi Wireless Technology Smart Technology Outlook Machine Learning Money Saving Time Employees Humor Integration Word Maintenance Sports Downloads Antivirus Holidays Mouse Licensing Safety Data Storage Entertainment Supply Chain Administration Video Conferencing Managed Services Provider Legal Data Analysis Workplace IT solutions Star Wars How To Microsoft Excel Gig Economy Notifications Staff Internet Service Provider Teamwork Hiring/Firing Business Growth Gamification Evernote Paperless Travel Social Networking Application Legislation Regulations Compliance Memes Techology Fileless Malware Co-managed IT Google Maps Cortana Wearable Technology Net Neutrality SQL Server Technology Care Alt Codes Content IBM Health IT Business Communications Downtime Unified Threat Management Motherboard Comparison Financial Data History IT Unified Threat Management Directions Scams Hosted Solution Assessment Permissions Smartwatch Procurement Azure Hybrid Work Typing Tech Human Resources Network Congestion Specifications Telework Cyber security CES Communitications Google Drive User Error Microchip Cables Internet Exlporer Competition Knowledge Fraud Supply Chain Management Username Term Google Apps Point of Sale 5G Black Friday FinTech IT Assessment Google Docs IT Maintenance Unified Communications Database Experience Running Cable Tech Support IT Technicians User Flexibility Value Business Intelligence Bitcoin Network Management Google Wallet Proxy Server Shortcuts Cookies Monitors Cyber Monday Organization Digital Security Cameras Smart Devices Ransmoware Tactics Hotspot Laptop Websites Mirgation Remote Working Memory Vendors Windows 8 IP Address Data Breach Drones Google Play Be Proactive Nanotechnology Videos Electronic Health Records SharePoint Workforce Addiction Electronic Medical Records Language Halloween Chatbots Recovery Wasting Time Threats Management Trend Micro Lenovo Security Cameras Workplace Strategies Screen Reader Hard Drives Writing Distributed Denial of Service Software as a Service Meta Service Level Agreement Domains Virtual Reality Computing Infrastructure Scary Stories Private Cloud Identity Managing Costs Amazon Hacks Server Management eCommerce Superfish Bookmark SSID Identity Theft Smart Tech Refrigeration Fun Surveillance Virtual Assistant Outsource IT Deep Learning Download Public Speaking Twitter Alerts Lithium-ion battery Media Error Virtual Machine Environment Browsers Medical IT Education Connectivity Social Engineering Break Fix Entrepreneur Reviews Development Transportation Small Businesses Upload Remote Computing Multi-Factor Security Hypervisor Displays Mobile Computing Social Network Optimization PowerPoint Tablet IoT Undo Search Dark Web Shopping Employer/Employee Relationships Outsourcing Best Practice Trends Alert Managed IT Customer Resource management Navigation Buisness File Sharing Regulations Dark Data Google Calendar PCI DSS

Blog Archive