Several threat operations have exploited Microsoft’s “ms-appinstaller protocol” to facilitate malware distribution, leading to its deactivation. The intruders were able to bypass safety measures by spoofing legitimate apps, thus installing loader malware and other harmful payloads. Microsoft’s Threat Intelligence team highlighted the use of the protocol for the delivery of the Carbanak malware and BATLOADER.
![](https://healsecurity.com/wp-content/uploads/2024/07/group-ibs-threat-intelligence-and-defence-centre-equip-undergraduates-with-sophisticated.jpg)
Group-IB’s Threat Intelligence and Defence Centre Equip Undergraduates with Sophisticated Cybersecurity Technologies to Boost Threat Analysis and Enhance Cyber Resilience for Campus Start-ups
Hey there from the heart of the San Francisco Bay Area! It’s an absolute pleasure to have you back again for our chat on some