Previous Topic

Next Topic

What Can Happen Without Sandbox?

If the Sandbox Agent does not protect your computer, hostile processes could access all the files and resources that are available on your computer. Your computer would be left wide open for destruction.

Recent studies and surveys have shown that most corporate networks and computers connected to the Internet have been attacked and have reported damages NOT from network based attacks which you can prevent by using traditional personal or network firewall BUT through malicious mobile code (ActiveX, Java, VBscript as well as other executables) which is increasingly being used to issue these attacks.

So - what can happen without the sandbox protection?

Deleting of files - unauthorized file access

A process deletes system or user files in the background while running on your computer. This attack can make your computer/operating system unusable and leads to loss of data and information.

Unauthorized access to services

By changing the configuration of your operating system or applications, your system/service or parts of it can become unusable or even launch the attack.

Execute malicious code or macros

A process can access data and files on your computer/network, copy and send them to any computer (e.g. to your competitors) on the Internet via e-mail or by using unrestricted IP ports.

Change registry configuration

A process can access your registry and change vital information or perhaps cause a crash of your system.

Unauthorized access to devices

A process may access your devices and cause a deletion of backup media - as an example.

Installation of unwanted/hostile application

A process could change your system configuration in order for a hostile application to be started automatically the next time you start your computer. This application could then undertake all its malicious tasks in the background or block access to particular or any resources on your computer.

Manipulation of your connection

A process could filter, manipulate or falsify information sent or received from another source.

Impersonation

A process could impersonate your user ID on the Internet or your local area network and initiate malicious, destructive or unwanted actions. It could therefore, abuse personal or sensitive information collected from your computer (e.g., credit card information).

See Also

Understanding TPF

What is Sandbox