• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft disables msix app installer protocol widely used in malware

Microsoft Disables MSIX App Installer Protocol Widely Used in Malware Attacks

You are here: Home / General Cyber Security News / Microsoft Disables MSIX App Installer Protocol Widely Used in Malware Attacks
December 29, 2023

Microsoft on Thursday explained it can be after once more disabling the ms-appinstaller protocol handler by default adhering to its abuse by various risk actors to distribute malware.

“The observed risk actor action abuses the current implementation of the ms-appinstaller protocol handler as an entry vector for malware that may well direct to ransomware distribution,” the Microsoft Threat Intelligence workforce claimed.

It further more observed that a number of cybercriminals are featuring a malware package for sale as a services that leverages the MSIX file format and ms-appinstaller protocol handler. The improvements have gone into impact in Application Installer edition 1.21.3421. or higher.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The attacks choose the type of signed destructive MSIX application deals that are dispersed by way of Microsoft Teams or malicious ads for respectable well-known software on lookup engines like Google.

Upcoming WEBINAR From Person to ADMIN: Study How Hackers Get Whole Control

Explore the mystery methods hackers use to become admins, how to detect and block it before it really is much too late. Sign-up for our webinar right now.

Be part of Now

At minimum 4 distinctive fiscally enthusiastic hacking teams have been observed having gain of the Application Installer services due to the fact mid-November 2023, using it as an entry issue for stick to-on human-operated ransomware exercise –

  • Storm-0569, an first entry broker which propagates BATLOADER by research engine optimization (Search engine marketing) poisoning with websites spoofing Zoom, Tableau, TeamViewer, and AnyDesk, and takes advantage of the malware to supply Cobalt Strike and handoff the accessibility to Storm-0506 for Black Basta ransomware deployment.
  • Storm-1113, an first entry broker that takes advantage of bogus MSIX installers masquerading as Zoom to distribute EugenLoader (aka FakeBat), which functions as a conduit for a variety of stealer malware and remote accessibility trojans.
  • Sangria Tempest (aka Carbon Spider and FIN7), which utilizes Storm-1113’s EugenLoader to drop Carbanak that, in convert, delivers an implant known as Gracewire. Alternatively, the group has relied on Google ads to lure people into downloading malicious MSIX application deals from rogue landing webpages to distribute POWERTRASH, which is then applied to load NetSupport RAT and Gracewire.
  • Storm-1674, an initial entry broker that sends fake landing webpages masquerading as Microsoft OneDrive and SharePoint via Groups messages working with the TeamsPhisher instrument, urging recipients to open up PDF data files that, when clicked, prompts them to update their Adobe Acrobat Reader to download a destructive MSIX installer that incorporates SectopRAT or DarkGate payloads.

Microsoft explained Storm-1113 as an entity that also dabbles in “as-a-support,” giving destructive installers and landing webpage frameworks mimicking effectively-regarded software program to other menace actors these types of as Sangria Tempest and Storm-1674.

Cybersecurity

In October 2023, Elastic Security Labs specific an additional campaign in which spurious MSIX Windows app offer documents for Google Chrome, Microsoft Edge, Brave, Grammarly, and Cisco Webex were employed to distribute a malware loader dubbed GHOSTPULSE.

This is not the initially time Microsoft has disabled the MSIX ms-appinstaller protocol handler in Windows. In February 2022, the tech huge took the same phase to prevent threat actors from weaponizing it to produce Emotet, TrickBot, and Bazaloader.

“Menace actors have probably selected the ms-appinstaller protocol handler vector because it can bypass mechanisms designed to support hold end users secure from malware, this kind of as Microsoft Defender SmartScreen and constructed-in browser warnings for downloads of executable file formats,” Microsoft claimed.

Identified this short article intriguing? Follow us on Twitter  and LinkedIn to go through additional unique material we post.


Some sections of this post are sourced from:
thehackernews.com

Previous Post: «google cloud resolves privilege escalation flaw impacting kubernetes service Google Cloud Resolves Privilege Escalation Flaw Impacting Kubernetes Service
Next Post: Kimsuky Hackers Deploying AppleSeed, Meterpreter, and TinyNuke in Latest Attacks kimsuky hackers deploying appleseed, meterpreter, and tinynuke in latest attacks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.