Microsoft on Thursday mentioned it is as soon as once more disabling the ms-appinstaller protocol handler by default following its abuse by a number of menace actors to distribute malware.
“The noticed menace actor exercise abuses the present implementation of the ms-appinstaller protocol handler as an entry vector for malware that will result in ransomware distribution,” the Microsoft Risk Intelligence group mentioned.
It additional famous that a number of cybercriminals are providing a malware equipment on the market as a service that leverages the MSIX file format and ms-appinstaller protocol handler. The adjustments have gone into impact in App Installer model 1.21.3421.0 or increased.
The assaults take the type of signed malicious MSIX software packages which can be distributed through Microsoft Groups or malicious commercials for respectable in style software program on serps like Google.
A minimum of 4 totally different financially motivated hacking teams have been noticed making the most of the App Installer service since mid-November 2023, utilizing it as an entry level for follow-on human-operated ransomware exercise –
- Storm-0569, an preliminary entry dealer which propagates BATLOADER via SEO (website positioning) poisoning with websites spoofing Zoom, Tableau, TeamViewer, and AnyDesk, and makes use of the malware to ship Cobalt Strike and handoff the entry to Storm-0506 for Black Basta ransomware deployment.
- Storm-1113, an preliminary entry dealer that makes use of bogus MSIX installers masquerading as Zoom to distribute EugenLoader (aka FakeBat), which acts as a conduit for a wide range of stealer malware and distant entry trojans.
- Sangria Tempest (aka Carbon Spider and FIN7), which makes use of Storm-1113’s EugenLoader to drop Carbanak that, in flip, delivers an implant known as Gracewire. Alternatively, the group has relied on Google advertisements to lure customers into downloading malicious MSIX software packages from rogue touchdown pages to distribute POWERTRASH, which is then used to load NetSupport RAT and Gracewire.
- Storm-1674, an preliminary entry dealer that sends harmless-looking touchdown pages masquerading as Microsoft OneDrive and SharePoint via Groups messages utilizing the TeamsPhisher instrument, urging recipients to open PDF recordsdata that, when clicked, prompts them to replace their Adobe Acrobat Reader to obtain a malicious MSIX installer that comprises SectopRAT or DarkGate payloads.
Microsoft described Storm-1113 as an entity that additionally dabbles in “as-a-service,” offering malicious installers and touchdown web page frameworks mimicking well-known software program to different menace actors equivalent to Sangria Tempest and Storm-1674.
In October 2023, Elastic Safety Labs detailed one other marketing campaign by which spurious MSIX Home windows app package deal recordsdata for Google Chrome, Microsoft Edge, Courageous, Grammarly, and Cisco Webex had been used to distribute a malware loader dubbed GHOSTPULSE.
This isn’t the primary time Microsoft has disabled the MSIX ms-appinstaller protocol handler in Home windows. In February 2022, the tech big took the identical step to forestall menace actors from weaponizing it to ship Emotet, TrickBot, and Bazaloader.
“Risk actors have possible chosen the ms-appinstaller protocol handler vector as a result of it may possibly bypass mechanisms designed to assist preserve customers secure from malware, equivalent to Microsoft Defender SmartScreen and built-in browser warnings for downloads of executable file codecs,” Microsoft mentioned.