When trusted applications are hijacked, they inherit the user’s full access to files, tools, the network, and the system itself. When compromised, they can steal data, encrypt files, launch PowerShell, and call out to malicious IPs.
That’s exactly how attacks like Follina spread: Word opens a document, launches MSDT, which triggers PowerShell. Suddenly, a trusted app becomes the attacker.
The solution? Put every application inside clear, enforced boundaries. Contain what it can touch. Contain what it can launch. Contain where it can connect. So, if it’s hijacked, it hits a wall. The application runs, but the attack doesn’t.