Microsoft stops malicious attacks with Windows Security update
Microsoft has released a security update, effectively addressing a critical vulnerability in Windows that cyber attackers were exploiting to compromise users’ systems. This vulnerability, which was based on the ms-app installer URI scheme, gave malevolent actors a mechanism to get around standard security measures and covertly install dangerous malware on machines while they were browsing the internet.
“ms-app installer” shortcut deactivation is Microsoft’s countermeasure. As a result, all apps downloaded from websites are now required to go through a security screening procedure that is akin to the standard checks that are performed when a file is downloaded manually. Microsoft’s prompt action guarantees that consumers are no longer vulnerable to the deceptive methods that hackers previously used.
The security vulnerability stemmed from the ms-app installer scheme, enabling websites to install apps directly through MSIX packages. Exploiting this, hackers employed phishing techniques to deceive users into clicking links that installed malware, posing as legitimate software. This method, bypassing local antivirus defenses, exposes users to potential data breaches, financial losses, and even system hijacking.
Microsoft responded quickly, releasing an update on December 28th that turned off the ms-app installer scheme by default. Consequently, users must first download the MSIX package to install apps directly from websites. This procedural change strengthens Windows customers’ overall security posture by giving antivirus software a chance to examine the package for potential dangers thoroughly.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.