Microsoft has disabled the App Installer feature in order to protect users from malicious exploitation. The ms-appinstaller URI scheme, which allows users to download and install apps directly from websites, is being abused by threat actors for malware distribution. The feature has been disabled by default in order to prevent cybercriminals from using social engineering and phishing techniques to trick users into downloading malicious apps. The ms-appinstaller URI scheme is being used as an access vector for malware, potentially leading to ransomware distribution. Cybercriminals are selling a malware kit that exploits the MSIX file format and handler. They distribute signed malicious packages through websites and malicious advertisements. Microsoft has released a security update that disables the ms-appinstaller URI scheme handler in App Installer build 1.21.3421.0. Users are advised not to download or install apps from unknown websites and to implement phishing-resistant authentication methods.
Microsoft shuts down App Installer due to malware exploitation.
Latest from Blog
Get the inside scoop on cybersecurity with Contrast CISO David Lindner
TLDR: SQL injection remains a problem that can be prevented with application detection and response. Implementing multi-factor authentication can help lower cybersecurity insurance costs. CISA’s role in election disinformation highlights the need
Stay ahead with the Cybersecurity Pulse Report: Black Hat 2024 Edition
Cybersecurity Pulse Report – Black Hat 2024 Edition Summary TLDR: This will be uploaded to wordpress and so you can start with a Cybersecurity Pulse Report – Black Hat 2024 Edition Key
Moody’s: Cyber insurance competition rises, prices fall
Moody’s Ratings: Cyber Insurance Competition Up, Prices Down TLDR: Cyber insurance market poised for growth due to increased demand. New players entering the market may decrease premiums. Article Summary The cyber insurance
Syxsense acquires Absolute to beat cyber vulnerabilities with strength
TLDR: Absolute Security has acquired Syxsense to enhance its cyber resilience platform. The acquisition will simplify patching and remediation issues through automation. Article Summary: Absolute Security has acquired Syxsense to improve its
Apache’s OFBiz gets new fix for RCE exploits
TLDR: Apache released a security update for OFBiz to patch vulnerabilities, including a bypass of patches for two exploited flaws. The bypass, tracked as CVE-2024-45195, allows unauthenticated remote attackers to execute code
Feds caution: Russia-linked CVE threats target essential infrastructure
TLDR: Threat groups linked to Russia’s military intelligence service are targeting critical infrastructure in various sectors. The attackers have defaced websites, scanned infrastructure, and leaked stolen data. Summary: Federal authorities in the
Allies blame Russian military for destructive cyber-attacks
TLDR: US and allies accuse Russian military of launching cyber-attacks targeting critical infrastructure for espionage and sabotage purposes. Unit 29155, a cyber group affiliated with the Russian military, is responsible for deploying
Brazil bans X, and Tom Alcock on cybersecurity talent hunt
TLDR: Key Points: Brazil banned X (Twitter) due to misinformation during the presidential election. Tom Alcock, founder of Code Red Partners, discussed the importance of cybersecurity talent recruitment beyond traditional methods. In
Palo Alto Networks acquires IBM’s QRadar Assets in SIEM victory
Article Summary TLDR: Palo Alto Networks has acquired IBM’s QRadar SaaS assets to enhance its cybersecurity capabilities. The integration of QRadar’s assets into Palo Alto Networks’ Cortex XSIAM platform will lead to
NIST CSF 20: Secure your cyber world with confidence framework
TLDR: NIST has released Version 2.0 of its Cybersecurity Framework (CSF) with an enhanced focus on Privileged Access Management (PAM) and Identity & Access Management (IAM). Key updates in NIST CSF 2.0