We can also verify the operating system code to see if it has been
modified by malware,» Reeves says.
Not exact matches
The severity of the attack is heightened
by the fact that, with Ledger's wallet software stored in the AppData folder, it is relatively easy for
malware to
modify the receiving address.
The DocDroid report further indicates that all Ledger software could be exploited and
modified by even unprivileged
malware, which means attackers could abuse its system without any need to gain administrative rights.
It's designed to stop
malware by only allowing trusted programs to
modify files in your personal data folders, like Documents and Pictures.