Dec. 28, 2023, 8 a.m. |

Microsoft Security Response Center msrc-blog.microsoft.com

Summary In recent months, Microsoft Threat Intelligence has observed threat actors leveraging social engineering and phishing techniques to target Windows OS users and utilizing the ms-appinstaller URI scheme. We have addressed and mitigated this malicious activity by turning off ms-appinstaller by default. Additionally, Microsoft has coordinated with Certificate Authorities to revoke the abused code signing certificates utilized by malware samples we have identified.

abuse addresses app app installer certificate certificate authorities code code signing coordinated default engineering installer intelligence malicious microsoft microsoft threat intelligence ms-appinstaller phishing phishing techniques signing social social engineering target techniques threat threat actors threat intelligence uri windows windows os

More from msrc-blog.microsoft.com / Microsoft Security Response Center

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC