Microsoft on Thursday mentioned it is as soon as once more disabling the ms-appinstaller protocol handler by default following its abuse by a number of menace actors to distribute malware.
“The noticed menace actor exercise abuses the present implementation of the ms-appinstaller protocol handler as an entry vector for malware that will result in ransomware distribution,” the Microsoft Risk Intelligence workforce mentioned.
It additional famous that a number of cybercriminals are providing a malware equipment on the market as a service that leverages the MSIX file format and ms-appinstaller protocol handler. The adjustments have gone into impact in App Installer model 1.21.3421.0 or increased.
The assaults take the type of signed malicious MSIX utility packages which can be distributed through Microsoft Groups or malicious ads for official widespread software program on serps like Google.
From USER to ADMIN: Be taught How Hackers Achieve Full Management
Uncover the key ways hackers use to grow to be admins, how one can detect and block it earlier than it is too late. Register for our webinar as we speak.
No less than 4 totally different financially motivated hacking teams have been noticed profiting from the App Installer service since mid-November 2023, utilizing it as an entry level for follow-on human-operated ransomware exercise –
- Storm-0569, an preliminary entry dealer which propagates BATLOADER by search engine marketing (search engine optimization) poisoning with websites spoofing Zoom, Tableau, TeamViewer, and AnyDesk, and makes use of the malware to ship Cobalt Strike and handoff the entry to Storm-0506 for Black Basta ransomware deployment.
- Storm-1113, an preliminary entry dealer that makes use of bogus MSIX installers masquerading as Zoom to distribute EugenLoader (aka FakeBat), which acts as a conduit for a wide range of stealer malware and distant entry trojans.
- Sangria Tempest (aka Carbon Spider and FIN7), which makes use of Storm-1113’s EugenLoader to drop Carbanak that, in flip, delivers an implant known as Gracewire. Alternatively, the group has relied on Google advertisements to lure customers into downloading malicious MSIX utility packages from rogue touchdown pages to distribute POWERTRASH, which is then used to load NetSupport RAT and Gracewire.
- Storm-1674, an preliminary entry dealer that sends faux touchdown pages masquerading as Microsoft OneDrive and SharePoint by Groups messages utilizing the TeamsPhisher software, urging recipients to open PDF information that, when clicked, prompts them to replace their Adobe Acrobat Reader to obtain a malicious MSIX installer that comprises SectopRAT or DarkGate payloads.
Microsoft described Storm-1113 as an entity that additionally dabbles in “as-a-service,” offering malicious installers and touchdown web page frameworks mimicking well-known software program to different menace actors corresponding to Sangria Tempest and Storm-1674.
In October 2023, Elastic Safety Labs detailed one other marketing campaign through which spurious MSIX Home windows app package deal information for Google Chrome, Microsoft Edge, Courageous, Grammarly, and Cisco Webex had been used to distribute a malware loader dubbed GHOSTPULSE.
This isn’t the primary time Microsoft has disabled the MSIX ms-appinstaller protocol handler in Home windows. In February 2022, the tech big took the identical step to forestall menace actors from weaponizing it to ship Emotet, TrickBot, and Bazaloader.
“Risk actors have probably chosen the ms-appinstaller protocol handler vector as a result of it might probably bypass mechanisms designed to assist hold customers protected from malware, corresponding to Microsoft Defender SmartScreen and built-in browser warnings for downloads of executable file codecs,” Microsoft mentioned.