Registry Keys Vulnerable with COM Hijacking

Attackers are leveraging a new technique that allows them to run a specious file that looks legitimate but is actually malicious, according to the research team at Cyberbit