Tux Machines

Do you waddle the waddle?

Other Sites

LinuxGizmos.com

Nordic Semiconductor Expands nRF54L Series with High-Memory nRF54LM20A SoC

According to Nordic, the nRF54LM20A integrates a 128 MHz Arm Cortex-M33 processor, a 128 MHz RISC-V coprocessor, and an expanded peripheral set that includes high-speed USB and support for up to 66 GPIOs. It is equipped with 2 MB of non-volatile memory and 512 KB of RAM, offering headroom for complex applications such as Matter-based smart home devices without requiring external memory.

AAEON Intelli i14 Edge Combines Intel Core i9 and NVIDIA RTX in Compact AI Vision System

According to AAEON, the Intelli i14 Edge is equipped with a 24-core, 32-thread Intel Core i9 CPU capable of handling parallel and latency-sensitive workloads simultaneously.

Ubuntu Buzz !

Characters - An Intro to Ubuntu Default Emoji/Unicode Application

Characters or GNOME Characters (not to be confused with Gucharmap) is Ubuntu default special character picker application. Speaking about its daily uses, you can use it to insert an emoji to your group chat text, or your national flag to your document just to note a few examples. Speaking about its technical aspects, it is written in C and GTK, developed in public by the GNOME community. And now we will learn more about it and a little bit about how to use it in real life. Let's start reading and enjoy!

9to5Linux

Zorin OS 18 Beta Released with Refreshed Look, Advanced Window Tiling, and More

Zorin OS 18 promises a refreshed default theme with a floating panel that has a rounded style to match the system’s look and feel and a new workspace indicator, a powerful new window tiling manager to boost productivity, and a new built-in Web Apps tool to make it even easier to install your favorite apps.

KDE Plasma 6.5 Desktop Environment Is Now Available for Public Beta Testing

KDE Plasma 6.5 is packed with lots of goodies for everyone, including major UI improvements to the Sticky Note widget, support for displaying ink levels on your printers, rounded bottom corners for Breeze-decorated windows, and support for syncing the clipboard text between the client and server on remote sessions.

GNOME 48.5 Improves Support for WPA(2) Enterprise Networks, Legacy Tray Icons

GNOME 48.5 is here about five weeks after the GNOME 48.4 release and improves support for WPA(2) Enterprise network connections, improves the order in which extensions are enabled or disabled, improves legacy tray icon support, and adds support for updating the viewport after changing the virtual monitor size.

Tails 7.0 Anonymous Linux OS Officially Released, Based on Debian 13 “Trixie”

Highlights of Tails 7.0 include a Debian 13 “Trixie” base and a kernel from the long-term supported Linux 6.12 LTS series from the upstream Debian release, the latest GNOME 48 desktop environment by default featuring GNOME Console as default terminal emulator and GNOME Loupe as default image viewer.

Tor Project blog

New Release: Tails 7.0

Tails 7.0 is dedicated to the memory of Lunar (1982–2024). Lunar was a traveling companion for Tails, a Tor volunteer, Free Software hacker, and community organizer.

news

Microsoft Windows 11 Caches Exploitable Malware

posted by Roy Schestowitz on May 15, 2024

Fishtank PC builds

Reprinted with permission from Cybershow. Author: Helen Plews.

Figure 1: Tom's Hardware: Fishtank PC builds.

Malware is often thought of as a human interaction with a digital device that causes an infection such as a virus or worm. We assume a human used bad authentication, or the human clicked the bad link, the human downloaded the malware…

So if we have anti-virus and anti-phish educational campaigns we should be well protected right? What about the technical side of cybersecurity, where the hardware, network equipment, end device or software vulnerability is the cause?

This article will examine a case where an operating system is able to automatically open and store a phishing email attachment, leading to potential compromise. In this case Windows 11 has been caching attachments locally to provide synchronisation across devices with the Outlook Application. In many cases, it has cached exploitable malware. This is a growing issue brought to light by Windows 11 users and anti-virus providers, instead of the makers at Microsoft.

Dropper Investigation

I am a life-long gamer and from experimentation over the years, I know I have the best rig, a customisable gaming PC. It’s very nice hardware it looks stunning with rainbow glowing fans and it sounds like a mini jet engine, rendering most graphics on Ultra with a graphics card which is at most 2 years old. The only issue I have had with it is in the operating system, which of course for a big gamer is Windows 11 due to its age. After just two weeks of operation I was alerted to a dropper located in my Windows Appdata folder, it was not dropping any further viruses yet as it had been caught by my expensive AV - which is why it sounds like a jet engine due to the large use of CPU!!

Was it a false positive? Well I ran the offline scan myself as my machine took 8x longer to boot. It behaved as if rebooting after a major update. There were no updates carried out, which made me suspect something amiss.

The virus location was not new to me, it is an appdata folder present in Windows 10 and Windows 11 for Windows mail in particular it processes mail syncing across devices; the full path is:

C:\Users\’Username’\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState\Files\SO\

Now I have had viruses popping up here before, in fact it has been an ongoing problem since I adopted the Windows 11 operating system (OS) in 2022 on the household laptops. Since then, both of my son’s laptops have alerted me to droppers and Trojans in the same Appdata folder. I initially assumed my children were not so good with their cybersecurity (being aged 5 and 9 that makes sense). Maybe they had clicked an email notification. Maybe they had downloaded some Trojan in the style of a game from a requested and shoddy gaming store all parents know about, stealthy and all whilst under supervision. That was until my brand new gaming rig got one.

Examining the attack timeline of my gaming rig in detail showed that a phish had been ‘clicked’ from my Hotmail account which was logged in on my Outlook App, running in the background processes (not running in my taskbar) whilst I played some epic title the night before. This ‘click’ put an infected PDF invoice on my PC, and on boot the next day activated the dropper, slowing the machine right down - which gave me a clue.

Now let's be clear about how Microsoft works, as I understand it, and why this is a gripe serious enough to warrant its own blog post.

You must sign in online to a Microsoft account to access the PC at all times, then it creates session keys for all applications that come installed as standard with the OS. So, unless you take some drastic measures I will discuss in a moment, you will undoubtedly be running sessions of Windows apps in the background; Outlook, OneDrive, Teams, Xbox, Photos, Office, Store, the list is quite extensive.

Moving on, I look for the phish email I had. According to my AV "clicked on" log, I located the suspicious subject of the email. It was something akin to;

AMAZON ACCOUNT ###U$IIHknDBWON38383y4y29~~~

Now, you do not need to be a cybersecurity expert to tell that is a phish from the subject which was located using the now foreground Outlook app. And as expected, it was unread. It showed me that within a few minutes of receiving the unread email, the attached PDF invoice was added to the Windows Communication Appdata folder, which led to the dropper found by the offline scan.

It seemed that Outlook App was saving unread attachments to the appdata folder where the virus was located. Some of the located viruses over the past two years were found on multiple devices that used the same MS credentials which unless stated otherwise, auto sync application data. That is exactly what the

microsoft.windowscommunicationsapps_8wekyb3d8bbwe

folder is for. It contains both the application data for Windows apps like Outlook to run and sync as well as data obtained in the process. I synced between my children's laptops as my account was the administrator for the network, it kept them safer online. Or so I thought.

Vulnerability Research

So I start down the usual process of researching the vulnerability to find a permanent mitigation. I find nothing at first, no CVE, no reports. I do find some details on the MS community website like this one from "2020 Trojan Found and Deleted"… but it Returns (Trojan: HTML/Phish.AB!MSR) . It is here I see the same problem and I see a response from an expert.

“The trojan is an email attachment synced to your PC. Do you have some Hotmail or Microsoft email setup in an email client applications like Outlook?” - Independent Expert, MS Community, 2020

So I search all around this topic and I cannot find anything from Microsoft about this issue right away, but I do find many victims. Anti-Virus companies, affected users and experts alike are all drawing attention to this problem. Eventually, thanks to Reddit I find a similar experience from a commentor who managed to find the reported exploit listed by Microsoft. You can find many more threads on the issue on Reddit with a search.

“Looking into the report we have a "Exploit:O97M/CVE-2017-11882.AZA!MTB" match, which doesn't seem to be that ominous since it requires the file to be executed on a non-updated Office/WordPad, still it ain't something I'd like to find lying around because the app found it was a good thing to download it, without my consent.” - JVMTG, Reddit, 2023

It is a known software error marked as severe on their own security intelligence website, with 24 exploits under the O97M CVE. I’d like to say I have more details from Microsoft but I do not, instead they offer very little default cybersecurity steps, such as "remain up to date and don’t click a phish".

This does seem rather severe. It locally caches attachments from emails including those which have not been opened to the windowscommunicationsapps folder from the Outlook App. It will then auto sync the data in the folder to all devices using the same credentials in their Outlook App on their phones, laptops, desktops, anywhere the Outlook App runs.

The only step missing for a full compromise is that infected files are auto-run… a feature I feel sure Microsoft are working on at this exact moment!

Attacks are becoming more complex, in 2022 they were able to add the dropper, which very slowly downloaded a fairly rubbish Trojan, which was easily removed. Recently there were 74 password protected files and multiple Trojans appearing as game applications in the same appdata folder. These were located only weeks after a fresh OS install and could not be explained by known activities on the machine or entirely resolved by AV due to the encryption of the folders they were located in.

Impact

Take a moment to think about how many commercial users of the Outlook application have auto-sync enabled in daily use. All those using Office 365 who sync between devices on their smartphone, personal devices and company equipment, or amongst family member's tablets and laptops. You should be concerned. And then get mad as hell, because it seems Microsoft have created their own quite special service for propagating malware, one that's been ongoing since at least 2020.

I have wasted countless hours re-installing OS’s, searching files, reading reports and researching this issue to find my only salvation in Reddit. Reddit of all places! This looks like something Microsoft rather wanted to sweep under the rug.

If you sync with Outlook App between devices with the same MS account, you are vulnerable to this malware propagation. Microsoft insist users take advantage of auto-synced features across devices and use this as a clear marketing tool especially for commercial settings. It seems my trust in this feature was misplaced.

Mitigation And Loss of Trust

Some will say that this is "just a feature" of sync. I disagree because like so many Microsoft processes it feels out of control. It does not just synchonise expected user data. It inappropriately populates and copies undocumented files into system folders and, without any knowledge or intervention from the user, replicates them across devices.

The mitigation is you must live without synchronisation in Microsoft applications. So far it has worked 100%. Turning off sync across applications does work. This can be done during an OS install by refusing all sync options when prompted. You must also make sure it is off in the account settings for the user. This can be done from the settings panel when logged on to Windows. There are many guides available like this one from Process.st. Even with sync off, you can still access email and other services using the web applications, which will sync files and emails but will not store these to the local machine.

If like myself, you have lost trust in the applications themselves, removing windows apps entirely may be more fitting, this allows the folder

microsoft.windowscommunicationsapps_8wekyb3d8bbwe

to be deleted and does not appear, like a lurking background threat at a later date just in case you change your mind. My gaming rig has only one MS app remaining, Xbox and that is the way it will stay until the situation is openly discussed by MS and the vulnerability resolved. No more Appdata Phishes please.

In summary, no amount of phishing training will prevent a bad design in the operating system. Caching malware infected attachments to system folders and replicating them is bad design in my opinion. In this case, the operating system has been phished, not the human.

Other Recent Tux Machines' Posts

Zorin OS 18 Beta Released with Refreshed Look, Advanced Window Tiling, and More
Today, the Zorin OS team announced the general availability for public testing of the beta version of the upcoming Zorin OS 18 release, which promises new and exciting features, a fresh new look, and more.
A Decade of Kubernetes and v1.34 Release
coverage has begun
Back Home, Back to Normal [original]
There's a lot of catching up to do
Microsoft is Very Stressed About People Moving to GNU/Linux [original]
Without Windows, there's really not much left to Microsoft
Q4OS 6.1 Distro Is Out Based on Debian 13 with KDE Plasma and Trinity Desktops
The Q4OS project announced today the release and general availability of Q4OS 6.1 as the newest stable (and LTS) version of this lightweight, KDE-oriented distribution featuring the latest KDE Plasma and Trinity desktop environments.
Microsoft Bribery Became a Norm (Even With Fictional Money) [original]
a distraction from the fact that every month this year Microsoft has had mass layoffs or a total of about 12 waves of layoffs in less than 9 months
 
This Week in Plasma: 6.5 beta and start of the bug-fix-a-palooza
This week we finalized the set of features and major changes in Plasma 6.5
Games: Baby Steps, Fogpiercer, Dying Breed, and More
8 stories from GamingOnLinux
today's leftovers
GNU/Linux and more
Programming Leftovers
Development picks
Open Hardware/Modding: GNU-like Mobile Linux, Raspberry Pi, and More
Devices and more
PuppEX Trixie64 (Puppy Linux) – compatible with Debian 13 – with Cinnamon as DE :: Build 250913
PuppEX Trixie64 – BUILD 250913 – with Cinnamon DE
Today in Techrights
Some of the latest articles
Ubuntu 25.10 Beta Released with Linux Kernel 6.17, GNOME 49, and More
Canonical released today the beta version of the upcoming Ubuntu 25.10 (Questing Quokka) release for public beta testing, so it’s time to take a look at what to expect from the final release.
Mozilla Thunderbird 143 Open-Source Email Client Arrives as a Bugfix-Only Release
Mozilla Thunderbird, an open-source, free, and cross-platform email, news, calendar, chat, and contactbook client, has been updated to version 143 as a bugfix-only release that addresses various issues.
ZenLake OS - remix of Debian or Ubuntu LTS
The minimal ISO is less than 2 GB, allowing you to install only the software you need after the system is set up.
Games: Godot, Steam, and Pixel Wheels
Some gaming picks
Applications: Rspamd, sshmate, and More
Software in review
Omarchy - opinionated Arch Linux distribution - LinuxLinks
Omarchy is an omakase distribution based on Arch GNU/Linux and the tiling window manager Hyprland.
Linux Mint Debian Edition (LMDE) 7 “Gigi” Is Now Available for Public Beta Testing
The long-anticipated LMDE (Linux Mint Debian Edition) 7 (codename Gigi) operating system is now available for public beta testing, featuring the latest Cinnamon desktop environment and a Debian Trixie base.
Vinari OS - Debian-based Linux distribution
Featuring the GNOME 43.9 desktop environment
today's leftovers
GNU/Linux and more
Announcing Rust 1.90.0
new release
Security Patches and Breaches, Latest CISA Reports
Security leftovers
KDE Plasma 6.5 Desktop Environment Is Now Available for Public Beta Testing
The KDE Project announced today the release of the beta version of the upcoming KDE Plasma 6.5 desktop environment series, a major update that will introduce new features, improvements, fixes, and other enhancements.
Microsoft is Rotting Away [original]
IBM tried this for decades; we know what happened to IBM
Every Holiday Must Come to an End [original]
Photos can wait until next week
Fedora/CentOS: Launch of Fedora Forge, Fedora Signing Update, and Bluefin
RHEL base-ish
Fedora Linux 43 Beta Released with Linux 6.17, GNOME 49, and KDE Plasma 6.4
The Fedora Project released today the beta version of the upcoming Fedora Linux 43 for public testing to give us a glimpse of the new features and report potential bugs.
GNOME 49 “Brescia” Desktop Environment Officially Released, Here’s What’s New
The GNOME Project released today GNOME 49 “Brescia” as the latest stable version of this widely used desktop environment for GNU/Linux distributions, a major release that introduces exciting new features.
Red Hat and CentOS Leftovers (Lots of Buzzwords, as Usual)
mostly from redhat.com
GNU/Linux and BSD Leftovers
half about BSD
Free, Libre, and Open Source Software and Open Data
FOSS and more
Programming Leftovers
Development related picks
today's howtos
10 howtos for now
Web Browsers and RSS Clients
some WWW leftovers
Events: FSF at 40, Open Developers Summit, and Akademy 2025
Events to come or coverage
KDE is now my favorite desktop
after using KDE for a while I am starting to really appreciate how good it is
A GEM Of A Desktop Environment
A look back
Tails 7.0 Anonymous Linux OS Released, Based on Debian 13 “Trixie”
Tails 7.0 is out today as a major update to this portable Linux OS based on the Debian GNU/Linux operating system that protects users against surveillance and censorship.
GNU/Linux Leftovers
GNU/Linux and more
Free, Libre, and Open Source Software and Microsoft-Funded 'FSFE'
FOSS and openwashing
today's howtos
including a video
Recent GNU/Linux Videos and Shows
via Invidious
IPFire 2.29 Core Update 197 Introduces a Complete OpenVPN Overhaul
IPFire 2.29 Core Update 197 has been released today as a new stable update to this open-source hardened Linux firewall distribution that brings various improvements, updated components, and other changes.
Games: Formula Legends, Alabaster Dawn, and More
10 new ones from GamingOnLinux
Today in Techrights
Some of the latest articles
Lagrange 1.19.2 is Out, Check Out Tux Machines in gemini:// (Gemini Protocol) [original]
Lagrange is far from the only client
How We Curate News in Tux Machines (Turning Thousands of Entries Into a Few Dozen Daily Pages/Clusters of Links) [original]
The vicious attacks on us mostly serve to affirm the importance of what we do here
Back Market revives old Windows 10 PCs with ChromeOS, Linux
The company further describes planned obsolescence as a strategy adopted by big tech companies like Microsoft,
Winux is a Linux distro Windows 11 lookalike with questionable value
Heard of Linuxfx and Wubuntu?
Heading Back Home [original]
In the meantime we're happy to report that more people get involved in helping us with the sites
Only Americans Ever Attacked Tux Machines [original]
We find it kind of funny if not ironic that this site, originally an American site, got legal harassment only from Americans
GNU/Linux Leftovers
Debian, Red Hat, and more
Databases, Open Data, and Standards
Free, Libre, and Open Source Software and beyond
GNUnet 0.25.0 and GNU Emacs
FSF and GNU leftovers
Games: Dolphin Emulator 2509, Retro, and More
GNU/Linux and beyond
Mozilla and Privacy (or Lack of It)
Mozilla's latest
Security Leftovers
Security picks
Programming Leftovers
Development related picks
Open Hardware/Modding: GuitarPedal, LattePanda, and More
hardware projects and more
KDE KWin Project and GNOME HDR Wallpapers
some desktop updates
Audiocasts/Show: FLOSS Weekly and Destination Linux
2 new episodes
today's howtos
Instructionals/Technical posts
After Arch Linux, Mageia Faces Infrastructure Outage
After Arch Linux, Mageia is now reporting infrastructure outages
New Version of Debian-Based SparkyLinux and Building Debian 13 Trixie Vagrant Image
Debian picks
GNOME 48.5 Improves Support for WPA(2) Enterprise Networks, Legacy Tray Icons
The GNOME Project announced today the release and general availability of GNOME 48.5 as the fifth maintenance update to the GNOME 48 “Bengaluru” desktop environment series.
New in LWN (Outside LWN Paywall)
from LWN only
How to easily switch your PC from Windows to Linux Mint and how to install Ubuntu On A Chromebook
installing GNU/Linux
Games: House of Necrosis, Flick Shot Rogues, and More
7 new picks
How and why Linux has thrived after three decades
'Just a hobby, won't be big and professional like GNU...'
Today in Techrights
Some of the latest articles
Testing the 2-in-1 Framework 12 Laptop
Framework supports Linux, but it does not sell systems with it pre-installed
KDE Linux Distribution Is Available for Public Testing, Download Now
The KDE Project released today the alpha version of the KDE Linux distribution, an in-house operating system to showcase the latest in-development versions of the KDE Plasma desktop environment and KDE apps.
Introducing Space Grade Linux
at the Embedded Linux Conference