Site icon WinCert

Cybercrime campaign exploits Windows Search to spread malware

<p>A new&comma; sophisticated cybercrime campaign has been discovered that exploits Windows search functionality to trick users into downloading malware&period; Security researchers at Trustwave SpiderLabs identified this campaign and described it as both ingenious and limited in scope&period;<&sol;p>&NewLine;<p><img class&equals;"alignnone size-full wp-image-5457" src&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;wp-content&sol;uploads&sol;2024&sol;06&sol;control-2633861&lowbar;640&period;png" alt&equals;"" width&equals;"640" height&equals;"336" &sol;><&sol;p>&NewLine;<p>The attack begins with a phishing email masked as an invoice&period; This email includes a ZIP file containing an HTML document&comma; bypassing antivirus and email security systems that usually overlook compressed files&period;<&sol;p>&NewLine;<p>Upon opening the HTML file&comma; a browser is launched and interacts with Windows Explorer’s search function&period; This search is programmed to look for &&num;8221&semi; INVOICE &&num;8221&semi; files in a specific directory hosted on a server routed through Cloudflare&period; To further deceive victims&comma; the search is renamed to &&num;8220&semi;Downloads&comma;&&num;8221&semi; making users believe they are accessing a file they have just downloaded&comma; rather than the contents of the ZIP archive&period;<&sol;p>&NewLine;<p>Among the displayed files is a shortcut &lpar;&period;LNK&rpar; which links to a batch script &lpar;&period;BAT&rpar; on the same server&period; When executed&comma; this script triggers additional malicious operations&period;<&sol;p>&NewLine;<p>Unfortunately&comma; by the time the researchers started analyzing the campaign&comma; the server had been shut down&comma; thus preventing them from identifying the exact nature of the malware being distributed&period; To mitigate this threat&comma; users can disable the search-ms&sol;search URI protocol handlers by deleting specific registry entries and additionally be very careful about emails with attachments&period;<&sol;p>&NewLine;

Exit mobile version