Microsoft fixes nasty bug used to infect Windows machines with Emotet malware
Date:
Wed, 15 Dec 2021 12:54:55 +0000
Description:
Emotet was one of the most widely distributed Trojans, but Patch Tuesday fix should do the job.
FULL STORY ======================================================================
A high severity Windows vulnerability which allowed malicious actors to install the Emotet malware on a target machine has been patched, Microsoft
has confirmed.
The zero-day, tracked as CVE-2021-43890, is a flaw that enables the spoofing of the Windows AppX Installer. Even though it can be used by threat actors with low user privileges, it does require the victims interaction with the target endpoint to be effective.
"We have investigated reports of a spoofing vulnerability in AppX installer that affects Microsoft Windows. Microsoft is aware of attacks that attempt to exploit this vulnerability by using specially crafted packages that include the malware family known as Emotet/Trickbot/Bazaloader," Microsoft detailed
in an announcement.
"An attacker could craft a malicious attachment to be used in phishing campaigns. The attacker would then have to convince the user to open the specially crafted attachment. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights." Workarounds are available
Depending on the version of Windows installed on the device, users can choose between two updates, to mitigate the threat: either Microsoft Desktop Installer 1.16 (for those with Windows 10, v. 1809 and newer), or Microsoft Desktop Installer 1.11 (for those with Windows 10, v 1709, or Windows 10, v 1803).
Those who are unable to install the updates for the Microsoft Desktop Installer, for any reason, can secure their devices by enabling BlockNonAdminUserInstall to prevent low privilege users from installing Windows App packages and AllowAllTrustedAppToInstall to block app installs from outside the Microsoft Store.
Emotet is a Trojan type of malware first spotted by cybersecurity researchers in 2014. Back then, it was designed to be a banking malware, and to steal sensitive and private information from the target device.
Newer versions of the Trojan allowed for the distribution of spam messages,
as well as other banking Trojan viruses . It was one of the most widely distributed Trojans until January, when law enforcement agencies shut down
and seized the botnet's infrastructure. You might also want to check out our list of the best ransomware protection right now
Via: Bleeping Computer
======================================================================
Link to news story:
https://www.techradar.com/news/microsoft-fixes-nasty-bug-used-to-infect-window s-machines-with-emotet-malware/
--- Mystic BBS v1.12 A47 (Linux/64)
* Origin: tqwNet Technology News (1337:1/100)