Tux Machines

Do you waddle the waddle?

Other Sites

9to5Linux

9to5Linux Weekly Roundup: April 19th, 2026

I want to thank everyone who sent us donations; your generosity is greatly appreciated. I also want to thank all of you for your continued support by commenting, liking, sharing, and boosting the articles, following us on social media, and, last but not least, sending us feedback.

GIMP 3.2.4 Improves Text and Crop Tools, PDF Export, PSD Import, and More

Coming about three weeks after GIMP 3.2.2, the GIMP 3.2.4 release improves the Text tool to correctly position the on-canvas GUI when rotating the canvas, prioritize the global actions when a shortcut matches before sending the hit keys to the IME (Input   Method Engine) when editing text, and prevent font size jumping to 0 when using shortcuts on selected text.

Solus 4.9 “Serenity” Released with Linux 6.18 LTS, KDE Plasma 6.6, and More

Powered by the long-term supported Linux 6.18 LTS kernel series, Solus 4.9 ships with the Budgie 10.9.4, GNOME 49.5, Xfce 4.20, and KDE Plasma 6.6.4 desktop environments, the latter being accompanied by the KDE Frameworks 6.24 and KDE Gear 25.12.3 software suites.

Shelly 2.1 Package Manager for Arch Linux Revamps AppImage Support

Shelly 2.1 is here to revamp AppImage support with a new UI to make installing AppImages easier and better syncing of AppImage apps, logging functionality to the “Recent Activity” panel that lets users view a transcript of the command logs, and support for viewing Flatpak permission changes on updates.

LinuxGizmos.com

Comet Q KVM supports browser-based control of laptops and iPhones over Wi-Fi 6

Comet Q is a compact KVM device designed to provide remote control of laptops, mini PCs, and supported mobile devices through a web browser. The system connects over USB Type-C and allows users to access and operate a target device without requiring software installation or driver configuration.

Banana Pi BPI-OM7 3D camera kit pairs RK3588 with Orbbec Gemini 2

Banana Pi has provided initial details about the BPI-OM7 3D camera kit, which combines the BPI-M7 single-board computer with an Orbbec Gemini 2 3D camera for computer vision, robotics, and spatial perception applications.

DongshanPI K510 SoM appears with dual RISC-V cores and AI acceleration

DongshanPI has previewed a SoM based on the Kendryte K510 in a recent social media post. The module targets AIoT applications involving computer vision and audio processing.

M5Stack previews CardputerZero handheld Raspberry Pi CM0 system

M5Stack has teased the CardputerZero, a compact handheld system built around the Raspberry Pi CM0. The device integrates a display, keyboard, battery, and wireless connectivity into a credit card-sized form factor intended for portable Linux-based development and command-line tasks.

news

Microsoft Windows 11 Caches Exploitable Malware

posted by Roy Schestowitz on May 15, 2024

Fishtank PC builds

Reprinted with permission from Cybershow. Author: Helen Plews.

Figure 1: Tom's Hardware: Fishtank PC builds.

Malware is often thought of as a human interaction with a digital device that causes an infection such as a virus or worm. We assume a human used bad authentication, or the human clicked the bad link, the human downloaded the malware…

So if we have anti-virus and anti-phish educational campaigns we should be well protected right? What about the technical side of cybersecurity, where the hardware, network equipment, end device or software vulnerability is the cause?

This article will examine a case where an operating system is able to automatically open and store a phishing email attachment, leading to potential compromise. In this case Windows 11 has been caching attachments locally to provide synchronisation across devices with the Outlook Application. In many cases, it has cached exploitable malware. This is a growing issue brought to light by Windows 11 users and anti-virus providers, instead of the makers at Microsoft.

Dropper Investigation

I am a life-long gamer and from experimentation over the years, I know I have the best rig, a customisable gaming PC. It’s very nice hardware it looks stunning with rainbow glowing fans and it sounds like a mini jet engine, rendering most graphics on Ultra with a graphics card which is at most 2 years old. The only issue I have had with it is in the operating system, which of course for a big gamer is Windows 11 due to its age. After just two weeks of operation I was alerted to a dropper located in my Windows Appdata folder, it was not dropping any further viruses yet as it had been caught by my expensive AV - which is why it sounds like a jet engine due to the large use of CPU!!

Was it a false positive? Well I ran the offline scan myself as my machine took 8x longer to boot. It behaved as if rebooting after a major update. There were no updates carried out, which made me suspect something amiss.

The virus location was not new to me, it is an appdata folder present in Windows 10 and Windows 11 for Windows mail in particular it processes mail syncing across devices; the full path is:

C:\Users\’Username’\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState\Files\SO\

Now I have had viruses popping up here before, in fact it has been an ongoing problem since I adopted the Windows 11 operating system (OS) in 2022 on the household laptops. Since then, both of my son’s laptops have alerted me to droppers and Trojans in the same Appdata folder. I initially assumed my children were not so good with their cybersecurity (being aged 5 and 9 that makes sense). Maybe they had clicked an email notification. Maybe they had downloaded some Trojan in the style of a game from a requested and shoddy gaming store all parents know about, stealthy and all whilst under supervision. That was until my brand new gaming rig got one.

Examining the attack timeline of my gaming rig in detail showed that a phish had been ‘clicked’ from my Hotmail account which was logged in on my Outlook App, running in the background processes (not running in my taskbar) whilst I played some epic title the night before. This ‘click’ put an infected PDF invoice on my PC, and on boot the next day activated the dropper, slowing the machine right down - which gave me a clue.

Now let's be clear about how Microsoft works, as I understand it, and why this is a gripe serious enough to warrant its own blog post.

You must sign in online to a Microsoft account to access the PC at all times, then it creates session keys for all applications that come installed as standard with the OS. So, unless you take some drastic measures I will discuss in a moment, you will undoubtedly be running sessions of Windows apps in the background; Outlook, OneDrive, Teams, Xbox, Photos, Office, Store, the list is quite extensive.

Moving on, I look for the phish email I had. According to my AV "clicked on" log, I located the suspicious subject of the email. It was something akin to;

AMAZON ACCOUNT ###U$IIHknDBWON38383y4y29~~~

Now, you do not need to be a cybersecurity expert to tell that is a phish from the subject which was located using the now foreground Outlook app. And as expected, it was unread. It showed me that within a few minutes of receiving the unread email, the attached PDF invoice was added to the Windows Communication Appdata folder, which led to the dropper found by the offline scan.

It seemed that Outlook App was saving unread attachments to the appdata folder where the virus was located. Some of the located viruses over the past two years were found on multiple devices that used the same MS credentials which unless stated otherwise, auto sync application data. That is exactly what the

microsoft.windowscommunicationsapps_8wekyb3d8bbwe

folder is for. It contains both the application data for Windows apps like Outlook to run and sync as well as data obtained in the process. I synced between my children's laptops as my account was the administrator for the network, it kept them safer online. Or so I thought.

Vulnerability Research

So I start down the usual process of researching the vulnerability to find a permanent mitigation. I find nothing at first, no CVE, no reports. I do find some details on the MS community website like this one from "2020 Trojan Found and Deleted"… but it Returns (Trojan: HTML/Phish.AB!MSR) . It is here I see the same problem and I see a response from an expert.

“The trojan is an email attachment synced to your PC. Do you have some Hotmail or Microsoft email setup in an email client applications like Outlook?” - Independent Expert, MS Community, 2020

So I search all around this topic and I cannot find anything from Microsoft about this issue right away, but I do find many victims. Anti-Virus companies, affected users and experts alike are all drawing attention to this problem. Eventually, thanks to Reddit I find a similar experience from a commentor who managed to find the reported exploit listed by Microsoft. You can find many more threads on the issue on Reddit with a search.

“Looking into the report we have a "Exploit:O97M/CVE-2017-11882.AZA!MTB" match, which doesn't seem to be that ominous since it requires the file to be executed on a non-updated Office/WordPad, still it ain't something I'd like to find lying around because the app found it was a good thing to download it, without my consent.” - JVMTG, Reddit, 2023

It is a known software error marked as severe on their own security intelligence website, with 24 exploits under the O97M CVE. I’d like to say I have more details from Microsoft but I do not, instead they offer very little default cybersecurity steps, such as "remain up to date and don’t click a phish".

This does seem rather severe. It locally caches attachments from emails including those which have not been opened to the windowscommunicationsapps folder from the Outlook App. It will then auto sync the data in the folder to all devices using the same credentials in their Outlook App on their phones, laptops, desktops, anywhere the Outlook App runs.

The only step missing for a full compromise is that infected files are auto-run… a feature I feel sure Microsoft are working on at this exact moment!

Attacks are becoming more complex, in 2022 they were able to add the dropper, which very slowly downloaded a fairly rubbish Trojan, which was easily removed. Recently there were 74 password protected files and multiple Trojans appearing as game applications in the same appdata folder. These were located only weeks after a fresh OS install and could not be explained by known activities on the machine or entirely resolved by AV due to the encryption of the folders they were located in.

Impact

Take a moment to think about how many commercial users of the Outlook application have auto-sync enabled in daily use. All those using Office 365 who sync between devices on their smartphone, personal devices and company equipment, or amongst family member's tablets and laptops. You should be concerned. And then get mad as hell, because it seems Microsoft have created their own quite special service for propagating malware, one that's been ongoing since at least 2020.

I have wasted countless hours re-installing OS’s, searching files, reading reports and researching this issue to find my only salvation in Reddit. Reddit of all places! This looks like something Microsoft rather wanted to sweep under the rug.

If you sync with Outlook App between devices with the same MS account, you are vulnerable to this malware propagation. Microsoft insist users take advantage of auto-synced features across devices and use this as a clear marketing tool especially for commercial settings. It seems my trust in this feature was misplaced.

Mitigation And Loss of Trust

Some will say that this is "just a feature" of sync. I disagree because like so many Microsoft processes it feels out of control. It does not just synchonise expected user data. It inappropriately populates and copies undocumented files into system folders and, without any knowledge or intervention from the user, replicates them across devices.

The mitigation is you must live without synchronisation in Microsoft applications. So far it has worked 100%. Turning off sync across applications does work. This can be done during an OS install by refusing all sync options when prompted. You must also make sure it is off in the account settings for the user. This can be done from the settings panel when logged on to Windows. There are many guides available like this one from Process.st. Even with sync off, you can still access email and other services using the web applications, which will sync files and emails but will not store these to the local machine.

If like myself, you have lost trust in the applications themselves, removing windows apps entirely may be more fitting, this allows the folder

microsoft.windowscommunicationsapps_8wekyb3d8bbwe

to be deleted and does not appear, like a lurking background threat at a later date just in case you change your mind. My gaming rig has only one MS app remaining, Xbox and that is the way it will stay until the situation is openly discussed by MS and the vulnerability resolved. No more Appdata Phishes please.

In summary, no amount of phishing training will prevent a bad design in the operating system. Caching malware infected attachments to system folders and replicating them is bad design in my opinion. In this case, the operating system has been phished, not the human.

Other Recent Tux Machines' Posts

Distributions and Operating Systems: A "next generation of Linux distros" and CachyOS Considered
Some OS picks from Valnet
GIMP 3.2.4 Improves Text and Crop Tools, PDF Export, PSD Import, and More
GIMP 3.2.4 open-source image editor is now available for download with improvements to Text and Crop tools, PDF export, PSD import, and more. Here’s what’s new!
Free, Libre, and Open Source Software Leftovers
FOSS picks
Games: Boutique Linux PC, Steam Runs On Nintendo Switch Using Valve's Proton Linux Beta, More on Valve's Proton 11 Beta
gaming picks
Why Zorin OS 18.1 is simply the best Linux distro - for anyone
Released today, the latest Zorin OS manages to improve upon previous versions
This Week in Plasma: Per-Screen Virtual Desktops and Wayland Session Restore
Last week over 20 KDE contributors converged on the Austrian city of Graz for our annual mega-sprint
 
Android Leftovers
OnePlus just turned its next phone into an Android gaming handheld
Free and Open Source Software
This is free and open source software
Butterbian – Debian-based Linux distribution with XFCE
Butterbian is a Debian 13 (Trixie) live ISO built around reliable rollback and recovery from the start
Review: Lakka 6.1
Lakka is a lightweight Linux distribution that transforms a computer into a game console
Today in Techrights
Some of the latest articles
9to5Linux Weekly Roundup: April 19th, 2026
9to5Linux Weekly Roundup for April 19th, 2026, brings news about KDE Gear 26.04, Archinstall 4.2, GNOME 50.1, Scribus 1.6.6, Zorin OS 18.1, GIMP 3.2.4, Solus 4.9, OpenSSL 4.0, Raspberry Pi OS 2026-04-13, Mir 2.26, COSMIC 1.0.10, new XOrg Server and Xwayland security releases, Proton 11 beta, Shelly 2.1, and more.
New Software for Running Tux Machines [original]
Some of the software tools we created for curating and maintaining this site have been improved
France Got the Ball Rolling [original]
2026 is shaping up to be a very fine year for GNU/Linux adoption
BSD and GNU/Linux Leftovers
today's leftovers
Kernel: Linux 7.0, Linux 7.1, and More
Linux links
Open Hardware/Modding Leftovers
hardware leftovers
Free, Libre, and Open Source Software Leftovers
FOSS leftovers
Web Browsers Leftovers
WWW links
Content Management Systems (CMS) / Static Site Generators (SSG) Leftovers
FOSS leftovers
Programming Leftovers
Development leftovers
Standards/Consortia: NIST and More
standards and more
Audiocasts/Shows: This Week in Linux and Linux Saloon
2 episodes
Games: Valve, NVIDIA, and More
gaming leftovers
today's howtos
Instructionals/Technical picks
Release of Wine 11.7, Valve Quietly Rebased Proton on Wine 11
WINE and stuff
Hello old new “Projects” directory!
If you have recently installed a very up-to-date Linux distribution with a desktop environment, or upgraded your system on a rolling-release distribution
Free and Open Source Software
This is free and open source software
openRuyi – Linux Distribution for RISC-V
openRuyi is an open source Linux distribution, initiated and long-term maintained by Institute of Software
Stable kernels: Linux 6.19.13, Linux 6.18.23, Linux 6.12.82, Linux 6.6.135, Linux 6.1.169, Linux 5.15.203, and Linux 5.10.253
I'm announcing the release of the 6.19.13 kernel
Why Was XLibre Removed From the Arch Wiki? The Full Story
accusing the Xorg project of being stifled by "toxic elements" and "moles from BigTech"
Today in Techrights
Some of the latest articles
Solus 4.9 “Serenity” Released with Linux 6.18 LTS, KDE Plasma 6.6, and More
Solus 4.9 distribution is now available for download with Linux kernel 6.18 LTS, Budgie 10.9.4, KDE Plasma 6.6, GNOME 49.5, and Xfce 4.20.
GNU/Linux and More
today's leftovers
Security Leftovers and Windows TCO (Windows Breaking Itself)
security updates
Free, Libre, and Open Source Software and Standards
FOSS and more
Programming Leftovers
Development picks
Abandoning Free Software While Blaming Slop and Clarifications on Discourse
Cal.com and Discourse
BSD Education: AsiaBSDCon and New York City *BSD User Group
BSD picks
PostgresSQL: PGDay Armenia and Swiss PGDay 2026
PostgresSQL news
Applications: Office Suites and Nixpilled
3 misc. software links
OpenSUSE: Tumbleweed Report and Planet News Roundup
openSUSE picks
Red Hat, Fedora, and Rocky Linux Leftovers
mostly Red Hat picks
Zorin OS 18.1 Boosts Windows App Support by 40%, Improves Window Tiling
Zorin OS 18.1 is now available for download based on Ubuntu 24.04.4 LTS and powered by the Linux 6.17 HWE kernel. Here’s what’s new!
Open Hardware/Modding: Orange Pi, ESP32, and More
gadgets and more
This Week in GNOME, GNOME Foundation Update, and More GNOME
mixture of GNOME updates
today's howtos
Instructionals/Technical picks
Games: Godot 4.7 Dev 5, Proton Beta, and More
gaming news, all in one
Shelly 2.1 Package Manager for Arch Linux Revamps AppImage Support
Shelly 2.1 package manager for Arch Linux is now available for download with better support for AppImage, Flatpak, and AUR packages, as well as many other enhancements.
The Man Who Wrote the Rules of Freedom for Software
Towards the end of January 2026, I emailed Richard for an interview
Emulation/Games: RPCS3, Gopher64, and Proton 11 Beta
GamingOnLinux's latest
Android Leftovers
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul
FRED Comes To Hobby Operating Systems (and Linux)
Of course, it would be silly to omit the fact that Linux received patches first
Kdenlive 26.04 is Out with Animated Transition Preview & Screen Mirroring
KDE announced the release of KDE Gear 26.04 on Thursday
Free and Open Source Software, howtos and Installations
This is free and open source software
PureOS Crimson Development Report: March 2026
Toward the best PureOS yet
Decades-old Linux UI bug fixed by dev younger than the window manager
Kamila Szewczyk prefers old software, as back then people understood something could actually be finished
Orange Pi Zero 3W – An Allwinner A733 SBC in Raspberry Pi Zero form factor
Orange Pi Zero 3W is Raspberry Pi Zero-sized SBC powered by an Allwinner A733 octa-core Arm Cortex-A76/A55 SoC paired with up to 16GB of LPDDR5 RAM
Today in Techrights
Some of the latest articles