Using a UIA caching mechanism, cybercriminals can stealthily interact with elements not shown on screens, like reading and sending messages. This applies to other applications; for instance, they can detect credit card information being typed on an online shopping site or manipulate the address bar to redirect users to a malicious website without raising suspicion.

Threat Brief: Widespread Impact of the Axios Supply Chain Attack – Unit 42
Threat Brief: Widespread Impact of the Axios Supply Chain Attack Unit 42


