Microsoft has disabled the ms-appinstaller protocol handler after threat actors were observed spreading malware using this method. The protocol handler can bypass security measures, such as Microsoft Defender SmartScreen, and built-in browser alerts for downloading executable files, making it an attractive vector for malware distribution. Microsoft Threat Intelligence has identified App Installer as a point of entry for human-operated ransomware activities by several threat actors. These threat actors have been using various techniques, including spoofing legitimate applications and tricking users into installing malicious packages that appear to be legitimate. Microsoft has observed instances where search engine optimization (SEO) poisoning was used to spread malware, with threat actors impersonating websites that offered legitimate downloads. Financially motivated threat actors have also been using search ads that mimic legitimate applications, such as Zoom, to distribute malware. Microsoft recommends implementing phishing-resistant user authentication techniques, educating Microsoft Teams users to verify external tagging on communication attempts, and encouraging the use of browsers that support Microsoft Defender SmartScreen.
Microsoft thwarts hackers with disabled App Installer, stopping malware installs.
Latest from Blog
Beware: UNC2970 Hackers Weapons in Job Seekers’ PDFs
TLDR: UNC2970 hackers are targeting job seekers with weaponized PDF files. They use sophisticated phishing tactics to deliver malware to victims. In a recent report, cybersecurity analysts at Google Mandiant have identified
Cyber insurance changes shape of security for good and bad
TLDR: Key Points: Cyber-insurance landscape is shifting to encourage greater cyber resiliency Rising costs of cyberattacks are prompting insurers to re-examine underwriting How Cyber-Insurance Shifts Affect the Security Landscape The article discusses
CMS warns nearly 1 million Medicare members of 2023 MOVEit breach
TLDR: 946,801 Medicare beneficiaries notified of May 2023 MOVEit breach Protected health and personal information compromised In September 2024, the Centers for Medicare & Medicaid Services (CMS) disclosed that nearly a million
BMW i invests in cybersecurity firm safeguarding software seamlessly
TLDR: BMW i Ventures invests $12 million in cybersecurity firm RunSafe Security RunSafe Security specializes in protecting software from cyberattacks without disruption Key Points: BMW i Ventures recently announced a $12 million
Chinese U Competition Hacks Real Victim: A Targeted University?
“`html TLDR: A Chinese hacking competition at Northwestern Polytechnical University raised suspicions of targeting a real victim. Participants were required to keep activities secret, delete backdoors, and sign a legal responsibility document.
GSMA to Implement Full Encryption for RCS Messaging Platforms
TLDR: The GSM Association (GSMA) is working on implementing end-to-end encryption (E2EE) for messages sent between Android and iOS ecosystems. RCS, an upgrade from SMS, is currently not E2E encrypted, prompting Google
Geopolitical stress rises, Iran’s cyber prowess expands
TLDR Iran’s cyber operations are growing, targeting regional allies and enemies APT34, APT33, Lemon Sandstorm, and Charming Kitten are some of the Iranian cyber groups involved in recent attacks In the midst
Russia’s wartime cyber espionage: a strategic game of cards
TLDR: Key Points: Russian cyber operations in wartime focus on espionage, sabotage, and disinformation. Russian cyber attacks target Ukraine’s government, critical infrastructure, and allied countries. In the realm of modern warfare, cyber-espionage
Snowflake debuts MFA with 14-character passwords for added security
TLDR: Snowflake has rolled out MFA by default on its platform alongside 14-character passwords. This move comes after a series of high-profile third-party hacks on Snowflake customers. According to a recent article
CISA’s Election Infrastructure Cybersecurity Checklist: Essential Preventive Measures Covered
Article Summary TLDR: The CISA cybersecurity checklist provides standard preventive measures for election infrastructure. It covers basics such as MFA, segmenting, backups, and email protections. CISA has released a new cybersecurity checklist