• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers abusing windows search feature to install remote access trojans

Hackers Abusing Windows Search Feature to Install Remote Access Trojans

You are here: Home / General Cyber Security News / Hackers Abusing Windows Search Feature to Install Remote Access Trojans
July 28, 2023

A legitimate Windows research aspect could be exploited by malicious actors to download arbitrary payloads from remote servers and compromise specific units with remote accessibility trojans such as AsyncRAT and Remcos RAT.

The novel attack system, for each Trellix, usually takes gain of the “look for-ms:” URI protocol handler, which presents the capacity for applications and HTML inbound links to launch personalized regional queries on a device, and the “search:” application protocol, a system for calling the desktop search software on Windows.

“Attackers are directing consumers to internet websites that exploit the ‘search-ms’ performance making use of JavaScript hosted on the webpage,” security scientists Mathanraj Thangaraju and Sijo Jacob claimed in a Thursday produce-up. “This system has even been prolonged to HTML attachments, expanding the attack area.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


In these types of attacks, risk actors have been noticed generating misleading emails that embed hyperlinks or HTML attachments made up of a URL that redirects people to compromised sites. This triggers the execution of JavaScript that would make use of the URI protocol handlers to perform queries on an attacker-managed server.

It’s truly worth noting that clicking on the hyperlink also generates a warning “Open up Windows Explorer?,” approving which “the look for benefits of remotely hosted destructive shortcut files are shown in Windows Explorer disguised as PDFs or other dependable icons, just like community research benefits,” the researchers defined.

“This good system conceals the fact that the person is remaining furnished with remote data files and provides the person the illusion of have faith in. As a result, the person is additional probably to open the file, assuming it is from their personal system, and unknowingly execute destructive code.”

Should really a sufferer click on a single of the shortcut information, it sales opportunities to the execution of a rogue dynamic-backlink library (DLL) making use of the regsvr32.exe utility.

In an substitute variant of the campaign, the shortcut data files are utilized to operate PowerShell scripts, which, in switch, download supplemental payloads in the track record, though displaying a decoy PDF document to deceive victims.

Regardless of the strategy utilized, the infections lead to the set up of AsyncRAT and Remcos RAT that can be applied by the menace actors to remotely commandeer the hosts, steal sensitive data, and even offer the accessibility to other attackers.

Approaching WEBINARShield Against Insider Threats: Learn SaaS Security Posture Management

Nervous about insider threats? We’ve bought you coated! Be part of this webinar to check out practical methods and the tricks of proactive security with SaaS Security Posture Administration.

Be part of These days

With Microsoft steadily taking techniques to clamp down on several initial obtain vectors, it really is envisioned that adversaries could latch on to the URI protocol handler approach to evade common security defenses and distribute malware.

“It is crucial to chorus from clicking on suspicious URLs or downloading files from unknown resources, as these actions can expose methods to destructive payloads shipped by the ‘search”https://thehackernews.com/”lookup-ms’ URI protocol handler,” the scientists mentioned.

Found this write-up attention-grabbing? Stick to us on Twitter  and LinkedIn to read through a lot more exclusive articles we put up.


Some elements of this short article are sourced from:
thehackernews.com

Previous Post: «bluebravo deploys graphicalproton backdoor against european diplomatic entities BlueBravo Deploys GraphicalProton Backdoor Against European Diplomatic Entities
Next Post: A Data Exfiltration Attack Scenario: The Porsche Experience a data exfiltration attack scenario: the porsche experience»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.