Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • Lower Myra Falls Hike, which is inevitable in StrateCona Provincial Park Park
    • How to lift the hole in the wall trail near Port Alberani, BC
    • Nice giants and fast collapses: herb animals in Tanzania
    • 3 days in Santorini – the best things to see and do
    • Children’s animals in Tanzania: A video article from Tarangy, Nugurongoro, and Serinjiti
    • This professional traveler reveals how to tour the world without any remorse
    • Spring of 2025 external equipment and new books guide
    • The 18 best beaches in the world
    Facebook X (Twitter) Instagram
    ZEMS BLOG
    • Home
    • Sports
    • Reel
    • Worklife
    • Travel
    • Future
    • Culture
    • Politics
    • Weather
    • Financial Market
    • Crypto
    ZEMS BLOG
    Home ยป Why is the main protocol disabled?
    Financial Market

    Why is the main protocol disabled?

    ZEMS BLOGBy ZEMS BLOGJanuary 6, 2024No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In response to the rising threat of malware attacks, the Microsoft Project team took swift action by disabling the widely abused ms-appinstaller protocol handler. This strategic move is part of Microsoft's efforts to leverage its cyber threat intelligence tools to counter the alarming exploitation of this protocol by multiple threat actors intent on distributing malware. Ransomware attacks loom as a major risk.

    Hazard detection

    Leveraging advanced cyber threat intelligence tools, the Microsoft Threat Intelligence team detected an exploit of the ms-appinstaller protocol handler as an access vector for malware distribution. As a result, the company decided to disable the protocol handler by default. The company aims to protect users from potential risks associated with malicious activities.

    Malware Microsoft Project: Kit for sale

    The threat is further exacerbated by cybercriminals selling a range of malware as a service, leveraging the MSIX file format and ms-appinstaller protocol handler. To address this emerging threat, Microsoft has implemented changes in App Installer version 1.21.3421.0 and later, a testament to the value of effective threat intelligence feeds.

    Attack method

    The attacks, organized by at least four financially motivated hacking groups, involve publishing signed malicious MSIX application packages. Fraudsters deceptively distribute these packages through trusted channels such as Microsoft Teams. They also disguise them as advertisements for legitimate software on search engines like Google.

    Diverse threat actors at work

    Several hacking groups have been identified exploiting the App Installer service since mid-November 2023. Each uses distinct tactics and underscores the need for robust threat intelligence feeds:

    1. Storm-0569: SEO poisoning with spoofed sites is used to spread BATLOADER, spreading Cobalt Strike and Black Basta ransomware.
    2. Storm-1113: Distributes EugenLoader disguised as Zoom, serving as an entry point for various data-stealing malware and remotely accessible Trojans.
    3. Sangria Tempest (Carbon Spider and FIN7): Utilize Storm-1113's EugenLoader to drop Carbanak and distribute POWERTRASH through Google Ads.
    4. The Storm-1674: Sends fake landing pages via Teams messages. It also encourages users to download malicious MSIX installers that contain SectopRAT or DarkGate payloads.

    Microsoft: Ongoing threats and past actions

    This is not the first time Microsoft has disabled the MSIX ms-appinstaller protocol handler. In February 2022, the company also took a similar step to abort the delivery of Emotet, TrickBot, and Bazaloader. The attractiveness of the protocol to threat actors lies in its ability to circumvent security mechanisms. However, this poses a major challenge to user safety.

    While Microsoft lists its past actions and remains vigilant in combating evolving cybersecurity threats, it urges users to stay informed and use best practices to strengthen their digital security. This includes regular updates, being careful with downloads, and staying on top of emerging threats in the ever-evolving cybersecurity landscape, highlighting the importance of cyber threat intelligence tools.



    Source link

    ZEMS BLOG
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleBitfinex partners with Torogoz Dev to fund training for Bitcoin and Lightning developers
    Next Article Concord Monitor – If you've seen the weather report from Marty Engstrom, you'll never forget it
    ZEMS BLOG
    • Website

    Related Posts

    Rail Gun rises 130.3%: What are analysts' expectations?

    April 17, 2024

    USDCAD is once again above the 1.38000 level

    April 17, 2024

    The changing face of marketing in the digital age

    April 17, 2024
    Leave A Reply Cancel Reply

    Lower Myra Falls Hike, which is inevitable in StrateCona Provincial Park Park

    June 30, 2025

    How to lift the hole in the wall trail near Port Alberani, BC

    June 26, 2025

    Nice giants and fast collapses: herb animals in Tanzania

    June 23, 2025

    3 days in Santorini – the best things to see and do

    June 22, 2025
    Recent Posts
    • Lower Myra Falls Hike, which is inevitable in StrateCona Provincial Park Park
    • How to lift the hole in the wall trail near Port Alberani, BC
    • Nice giants and fast collapses: herb animals in Tanzania
    • 3 days in Santorini – the best things to see and do
    • Children’s animals in Tanzania: A video article from Tarangy, Nugurongoro, and Serinjiti
    About

    ZEMS BLOG in partnership with Holiday Omega keeps you informed. Bringing you the latest news from around the world with fresh perspectives and unique insights. Your daily source for news from around the world. All perspectives, all curated for a global audience.

    Facebook X (Twitter) Instagram YouTube Telegram
    • About Us
    • Contact Us
    • Privacy Policy
    • Disclaimer
    Subscribe For latest updates

    Type above and press Enter to search. Press Esc to cancel.