{"id":132866,"date":"2023-12-28T10:00:00","date_gmt":"2023-12-28T18:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=132866"},"modified":"2024-07-03T08:24:49","modified_gmt":"2024-07-03T15:24:49","slug":"financially-motivated-threat-actors-misusing-app-installer","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/12\/28\/financially-motivated-threat-actors-misusing-app-installer\/","title":{"rendered":"Financially motivated threat actors misusing App Installer"},"content":{"rendered":"\n
Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, including financially motivated actors like Storm-0569<\/a>, Storm-1113, Sangria Tempest<\/a>, and Storm-1674, utilizing the ms-appinstaller URI scheme<\/a> (App Installer) to distribute malware. In addition to ensuring that customers are protected from observed attacker activity, Microsoft investigated the use of App Installer in these attacks. In response to this activity, Microsoft has disabled the ms-appinstaller protocol handler by default.<\/p>\n\n\n\n The observed threat actor activity abuses the current implementation of the ms-appinstaller protocol handler as an access vector for malware that may lead to ransomware distribution. Multiple cybercriminals are also selling a malware kit as a service that abuses the MSIX file format and ms-appinstaller protocol handler. These threat actors distribute signed malicious MSIX application packages using websites accessed through malicious advertisements for legitimate popular software. A second vector of phishing through Microsoft Teams is also in use by Storm-1674.<\/p>\n\n\n\n\n\n Threat actors have likely chosen the ms-appinstaller protocol handler vector because it can bypass mechanisms designed to help keep users safe from malware, such as Microsoft Defender SmartScreen and built-in browser warnings for downloads of executable file formats.<\/p>\n\n\n\n\n\n In this blog, we provide an analysis of activity by financially motivated threat actors abusing App Installer observed since mid-November 2023.<\/p>\n\n\n\n\n\n Microsoft Threat intelligence observed several actors\u2014including Storm-0569, Storm-1113, Sangria Tempest, and Storm-1674\u2014using App Installer as a point of entry for human-operated ransomware activity. The observed activity includes spoofing legitimate applications, luring users into installing malicious MSIX packages posing as legitimate applications, and evading detections on the initial installation files. <\/p>\n\n\n\n At the beginning of December 2023, Microsoft observed Storm-0569 distributing BATLOADER through search engine optimization (SEO) poisoning with sites spoofing legitimate software downloads such as Zoom, Tableau, TeamViewer, and AnyDesk. Users who search for a legitimate software application on Bing or Google may be presented with a landing page spoofing the original software provider\u2019s landing pages that include links to malicious installers through the ms-appinstaller protocol. Spoofing and impersonating popular legitimate software is a common social engineering tactic. These software are not affected by the attacks directly, but this information can help users better spot malicious spoofing by threat actors.<\/p>\n\n\nThreat actors abusing App Installer since mid-November 2023<\/h2>\n\n\n\n
Storm-0569<\/h3>\n\n\n\n