Hackers Exploit Windows Search Feature to Execute Malware on Infected Systems

by Esmeralda McKenzie
Hackers Exploit Windows Search Feature to Execute Malware on Infected Systems

Hackers Exploit Windows Search Feature to Execute Malware on Infected Systems

Hackers Exploit Residence windows Search

Malware authors again and again explore new approaches to use unsuspecting customers within the energetic cyber possibility panorama.

To without complications locate the total readily available files, folders, and other objects for your Residence windows system, Microsoft Residence windows OS affords an prominent highly efficient tool known because the Residence windows search characteristic.

Unexplored by many, the “search-ms” URI protocol handler in Residence windows enables potent native and faraway searches, but security researchers at Trellix warn of capability exploitation.

Table of Contents

Infection Chain

Cybersecurity researchers at Trellix Superior Study Heart printed that this unique attack approach exploits the “search-ms” URI protocol with JavaScript on websites and HTML attachments.

This expands the attack floor and no longer simplest that even additionally explores the “search” protocol as effectively.

Possibility actors exploit the “search-ms” protocol to deceive customers with emails, compromised websites, and disguised faraway files to produce them design malicious code unknowingly.

3Z QAE83VLcs70 6Z XUOv54IZAqIaR PjFJP61klaOXzNYtFrLwbJVjW1A TZ UdCHR7Qfv81dFcNPd1At9vMpuOsSfz5WM46USH8Hdfv bdf24SXekQPJOFM dMhhCUryQMjPVmP1K4YLWDAlLHK0
Infection Chain (Supply – Trellix)

Besides this, security analysts detected several phishing emails utilizing the “search-ms” protocol to bring a malicious payload, masked as pressing gross sales citation requests.

XssOy12B
Phishing emails (Supply – Trellix)

Varied attack variants have confidence emails with HTML/PDF attachments containing URLs to compromised websites utilizing the ‘search-ms’ URI protocol handler, while embedded scripts in HTML files can additionally trigger the attack.

As soon as the hyperlink within the electronic mail or attachment is clicked, customers compile redirected to a enviornment exploiting the “search-ms” URI protocol handler, revealing a suspicious script within the GET request for internet page.html:-

iJrG7PlhbQRdHCP3gY0mE02hu8fQNf4LxVIfhhOXFk4IRQdxXOtdyk9riiwSgMGS8q75hSinIMo7eLJ7T7dynjq6wLH4tH R3QicxSvmp81Fr DETNnuK1Vw fUgPcaJGbFKtfaBogkD7kQLDsYRsbk
HTML with ‘search-ms’ URI Protocol Handler (Supply – Trellix)

Experts explain a form of PowerShell file variants in this investigation, comprising:-

  • The “over.ps1” file downloads an ISO file.
  • PowerShell scripts straight download the DLL payload and design it.
  • PowerShell scripts that trigger the download of a zipper file containing an EXE payload.
  • PowerShell scripts that download and design DLL files.
  • PowerShell scripts that download and design VBS files.

The campaign deploys faraway compile entry to trojans (RATs) like Async RAT and Remcos RAT to succeed in unauthorized preserve watch over over contaminated programs, facilitating:-

  • Data theft
  • Particular person monitoring
  • Recount execution

The Remcos RAT employs null byte injection in its EXE payload to evade security products. The attacker employs a proactive methodology, consistently updating files to manual clear of security product detection, and bypassing static signatures and known IoCs.

ykPOMiE
Multiple HTML earlier as an preliminary attack vector (Supply – Trellix)

Security analysts stumbled on attacker-managed file servers, some lacking authentication, posing a massive security possibility by enabling easy compile entry to for extra exploitation.

Solutions

Right here Beneath we now have confidence talked about the total recommendations:-

  • Create certain to exercise warning and be vigilant about untrusted links.
  • It is critical no longer to click on suspicious URLs or download files from unknown sources to manual clear of capability risks.
  • Beware of the exploitation of the “search” / “search-ms” URI protocol handler to bring malicious payloads to programs.
  • Create certain to manual clear of participating with doubtlessly corrupt links and files.
  • Consistently preserve your system and AV instruments up up to now with the readily available most modern security patches and updates.
  • Create certain to use a sturdy AV solution.

Source credit : cybersecuritynews.com

Related Posts