cognitive cybersecurity intelligence

News and Analysis

Search

Malware attacks exploiting app installation protocol prompt deactivation

Several threat operations have exploited Microsoft’s “ms-appinstaller protocol” to facilitate malware distribution, leading to its deactivation. The intruders were able to bypass safety measures by spoofing legitimate apps, thus installing loader malware and other harmful payloads. Microsoft’s Threat Intelligence team highlighted the use of the protocol for the delivery of the Carbanak malware and BATLOADER.

Source: www.scmagazine.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

A Better Connected Care Journey

The article urges healthcare organizations to move towards integrated, digitally enabled care delivery, replacing outdated point solutions. It acknowledges some may need help overcoming hurdles.