Threat actors are disseminating malware through the ms-appinstaller URI scheme, which Microsoft has now disabled by default. This method was chosen because it can evade security precautions like Microsoft Defender SmartScreen. Microsoft’s Threat Intelligence team has identified it as an entry point for ransomware, used by threat actors like Storm-0569, Storm-1113, Sangria Tempest, and Storm-1674. The actors spoof legitimate apps, trick users into installing malicious packages, and avoid early detection. Microsoft is advising users to implement phishing-resistant authentication to safeguard against these attacks.

Lazarus Hackers Exploiting IIS Servers to Deploy ASP-based Web Shells
The Lazarus group has launched sophisticated attacks on South Korean web servers, deploying ASP-based web shells as first-stage Command and Control (C2) servers. These attacks,