Dec. 29, 2023, 6:50 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

Several threat operations including Sangria Tempest or FIN7, Storm-0569, Storm-1674, and Storm-1113 have exploited Microsoft's "ms-appinstaller protocol" for expediting Windows app installation to facilitate malware distribution, resulting in the deactivation of the protocol, reports The Record, a news site by cybersecurity firm Recorded Future.


Article Link: Malware attacks exploiting app installation protocol prompt deactivation | SC Media


1 post - 1 participant


Read full topic

app article attacks cybersecurity deactivation distribution exploited exploiting fin7 future installation link malware malware attacks malware distribution microsoft ms-appinstaller operations prompt protocol record recorded future reports storm tempest the record threat threat operations windows

Senior Security Researcher

@ Microsoft | Redmond, Washington, United States

Sr. Cyber Risk Analyst

@ American Heart Association | Dallas, TX, United States

Cybersecurity Engineer 2/3

@ Scaled Composites, LLC | Mojave, CA, US

Information Security Operations Manager

@ DP World | Charlotte, NC, United States

Sr Cyber Security Engineer I

@ Staples | Framingham, MA, United States

Security Engineer - Heartland (Remote)

@ GuidePoint Security LLC | Remote in the US