Tux Machines

Do you waddle the waddle?

Other Sites

9to5Linux

MX Linux 25.2 Enters Public Beta Testing with New Text Mode Installer

The MX Linux 25.2 release is the second update in the MX Linux 25 “Infinity” series and promises to ship with a much-improved installer that now features a new text mode, allowing you to install MX Linux in a terminal emulator by running sudo minstall --tui or a text console by running minstall-launcher.

9to5Linux Weekly Roundup: May 10th, 2026

I want to thank everyone who sent us donations; your generosity is greatly appreciated. I also want to thank all of you for your continued support by commenting, liking, sharing, and boosting the articles, following us on social media, and, last but not least, sending us feedback.

Audacious 4.6 Media Player Promises File Browser Plugin, Beta Out Now

Audacious 4.6 promises a new File Browser plugin, which will be available for both GTK and Qt interfaces, a macOS Now Playing plugin, support for exporting playlists via command line with audtool, support for playing Musepack SV8 files, and support for all AIFF extensions and MIME types.

Shelly 2.2.4 Arch Linux GUI Package Manager Brings Smarter Fuzzy Search

Shelly 2.2.4 is the fourth maintenance update in the Shelly 2.2 series, but an important one that introduces smarter fuzzy search across every package list, a refactor of the built-in search feature with package group search and sortable search columns, support for build dates in package details, and fingerprint authentication support.

Parrot 7.2 Is Now Officially Available for Download with “Copy Fail” Patch

Coming about three months after Parrot 7.1, Parrot 7.2 is here as the second update to the Parrot 7.0 series, which was the first to move from using MATE to KDE Plasma as the default desktop environment. However, MATE and LXQt spins are also available, along with an Enlightenment spin that was introduced in the Parrot 7.1 release.

Firefox 150.0.2 Improves Webcam Support, Split View, PDF Viewer, and More

Coming two weeks after Firefox 150, the Firefox 150.0.2 release is here to improve how the web browser displays websites with advanced 3D effects, fixing cases where parts of the page could disappear or appear incorrectly, as well as to improve the appearance of search suggestions in the address bar by preventing icons from appearing stretched or distorted.

Giada 1.4.1 Open-Source Loop Machine Adds MIDI Control for Switching Scenes

Giada 1.4.1 is the first maintenance update to the Giada 1.4 “Korrigan” series, which introduces support for scenes as a new way to add greater variety and richness to your live performances, and it enhances this feature by adding support for switching scenes via keyboard or MIDI using custom bindings.

LinuxGizmos.com

Sipeed launches K3 Pico-ITX and CoM260 boards with SpacemiT RISC-V SoC

Sipeed has opened pre-orders for the SpacemiT K3 CoM260 Developer Kit and K3 Pico-ITX, two RISC-V AI computing platforms based on the SpacemiT Key Stone K3 processor. The systems combine eight X100 RISC-V CPU cores with eight A100 AI-oriented compute cores delivering up to 60 TOPS of AI performance for edge AI and embedded workloads.

SpacemiT K3 integrates 8-core RISC-V CPU cluster and 60 TOPS AI engine

SpacemiT’s Key Stone K3 is a high-performance RISC-V SoC designed for AI and edge computing applications. The processor combines eight X100 64-bit RISC-V CPU cores with eight A100 AI-oriented compute cores, along with multimedia, networking, and high-speed I/O support targeting edge and embedded AI workloads.

IOT-GATE-RPI5 is a Fanless Raspberry Pi CM5 Gateway with RS485 and CAN-FD

CompuLab has unveiled the IOT-GATE-RPI5, an industrial IoT edge gateway built around the Raspberry Pi Compute Module 5. The system combines the BCM2712 quad-core Cortex-A76 processor with industrial interfaces, optional cellular connectivity, and support for wide operating temperatures.

news

Microsoft Windows 11 Caches Exploitable Malware

posted by Roy Schestowitz on May 15, 2024

Fishtank PC builds

Reprinted with permission from Cybershow. Author: Helen Plews.

Figure 1: Tom's Hardware: Fishtank PC builds.

Malware is often thought of as a human interaction with a digital device that causes an infection such as a virus or worm. We assume a human used bad authentication, or the human clicked the bad link, the human downloaded the malware…

So if we have anti-virus and anti-phish educational campaigns we should be well protected right? What about the technical side of cybersecurity, where the hardware, network equipment, end device or software vulnerability is the cause?

This article will examine a case where an operating system is able to automatically open and store a phishing email attachment, leading to potential compromise. In this case Windows 11 has been caching attachments locally to provide synchronisation across devices with the Outlook Application. In many cases, it has cached exploitable malware. This is a growing issue brought to light by Windows 11 users and anti-virus providers, instead of the makers at Microsoft.

Dropper Investigation

I am a life-long gamer and from experimentation over the years, I know I have the best rig, a customisable gaming PC. It’s very nice hardware it looks stunning with rainbow glowing fans and it sounds like a mini jet engine, rendering most graphics on Ultra with a graphics card which is at most 2 years old. The only issue I have had with it is in the operating system, which of course for a big gamer is Windows 11 due to its age. After just two weeks of operation I was alerted to a dropper located in my Windows Appdata folder, it was not dropping any further viruses yet as it had been caught by my expensive AV - which is why it sounds like a jet engine due to the large use of CPU!!

Was it a false positive? Well I ran the offline scan myself as my machine took 8x longer to boot. It behaved as if rebooting after a major update. There were no updates carried out, which made me suspect something amiss.

The virus location was not new to me, it is an appdata folder present in Windows 10 and Windows 11 for Windows mail in particular it processes mail syncing across devices; the full path is:

C:\Users\’Username’\AppData\Local\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState\Files\SO\

Now I have had viruses popping up here before, in fact it has been an ongoing problem since I adopted the Windows 11 operating system (OS) in 2022 on the household laptops. Since then, both of my son’s laptops have alerted me to droppers and Trojans in the same Appdata folder. I initially assumed my children were not so good with their cybersecurity (being aged 5 and 9 that makes sense). Maybe they had clicked an email notification. Maybe they had downloaded some Trojan in the style of a game from a requested and shoddy gaming store all parents know about, stealthy and all whilst under supervision. That was until my brand new gaming rig got one.

Examining the attack timeline of my gaming rig in detail showed that a phish had been ‘clicked’ from my Hotmail account which was logged in on my Outlook App, running in the background processes (not running in my taskbar) whilst I played some epic title the night before. This ‘click’ put an infected PDF invoice on my PC, and on boot the next day activated the dropper, slowing the machine right down - which gave me a clue.

Now let's be clear about how Microsoft works, as I understand it, and why this is a gripe serious enough to warrant its own blog post.

You must sign in online to a Microsoft account to access the PC at all times, then it creates session keys for all applications that come installed as standard with the OS. So, unless you take some drastic measures I will discuss in a moment, you will undoubtedly be running sessions of Windows apps in the background; Outlook, OneDrive, Teams, Xbox, Photos, Office, Store, the list is quite extensive.

Moving on, I look for the phish email I had. According to my AV "clicked on" log, I located the suspicious subject of the email. It was something akin to;

AMAZON ACCOUNT ###U$IIHknDBWON38383y4y29~~~

Now, you do not need to be a cybersecurity expert to tell that is a phish from the subject which was located using the now foreground Outlook app. And as expected, it was unread. It showed me that within a few minutes of receiving the unread email, the attached PDF invoice was added to the Windows Communication Appdata folder, which led to the dropper found by the offline scan.

It seemed that Outlook App was saving unread attachments to the appdata folder where the virus was located. Some of the located viruses over the past two years were found on multiple devices that used the same MS credentials which unless stated otherwise, auto sync application data. That is exactly what the

microsoft.windowscommunicationsapps_8wekyb3d8bbwe

folder is for. It contains both the application data for Windows apps like Outlook to run and sync as well as data obtained in the process. I synced between my children's laptops as my account was the administrator for the network, it kept them safer online. Or so I thought.

Vulnerability Research

So I start down the usual process of researching the vulnerability to find a permanent mitigation. I find nothing at first, no CVE, no reports. I do find some details on the MS community website like this one from "2020 Trojan Found and Deleted"… but it Returns (Trojan: HTML/Phish.AB!MSR) . It is here I see the same problem and I see a response from an expert.

“The trojan is an email attachment synced to your PC. Do you have some Hotmail or Microsoft email setup in an email client applications like Outlook?” - Independent Expert, MS Community, 2020

So I search all around this topic and I cannot find anything from Microsoft about this issue right away, but I do find many victims. Anti-Virus companies, affected users and experts alike are all drawing attention to this problem. Eventually, thanks to Reddit I find a similar experience from a commentor who managed to find the reported exploit listed by Microsoft. You can find many more threads on the issue on Reddit with a search.

“Looking into the report we have a "Exploit:O97M/CVE-2017-11882.AZA!MTB" match, which doesn't seem to be that ominous since it requires the file to be executed on a non-updated Office/WordPad, still it ain't something I'd like to find lying around because the app found it was a good thing to download it, without my consent.” - JVMTG, Reddit, 2023

It is a known software error marked as severe on their own security intelligence website, with 24 exploits under the O97M CVE. I’d like to say I have more details from Microsoft but I do not, instead they offer very little default cybersecurity steps, such as "remain up to date and don’t click a phish".

This does seem rather severe. It locally caches attachments from emails including those which have not been opened to the windowscommunicationsapps folder from the Outlook App. It will then auto sync the data in the folder to all devices using the same credentials in their Outlook App on their phones, laptops, desktops, anywhere the Outlook App runs.

The only step missing for a full compromise is that infected files are auto-run… a feature I feel sure Microsoft are working on at this exact moment!

Attacks are becoming more complex, in 2022 they were able to add the dropper, which very slowly downloaded a fairly rubbish Trojan, which was easily removed. Recently there were 74 password protected files and multiple Trojans appearing as game applications in the same appdata folder. These were located only weeks after a fresh OS install and could not be explained by known activities on the machine or entirely resolved by AV due to the encryption of the folders they were located in.

Impact

Take a moment to think about how many commercial users of the Outlook application have auto-sync enabled in daily use. All those using Office 365 who sync between devices on their smartphone, personal devices and company equipment, or amongst family member's tablets and laptops. You should be concerned. And then get mad as hell, because it seems Microsoft have created their own quite special service for propagating malware, one that's been ongoing since at least 2020.

I have wasted countless hours re-installing OS’s, searching files, reading reports and researching this issue to find my only salvation in Reddit. Reddit of all places! This looks like something Microsoft rather wanted to sweep under the rug.

If you sync with Outlook App between devices with the same MS account, you are vulnerable to this malware propagation. Microsoft insist users take advantage of auto-synced features across devices and use this as a clear marketing tool especially for commercial settings. It seems my trust in this feature was misplaced.

Mitigation And Loss of Trust

Some will say that this is "just a feature" of sync. I disagree because like so many Microsoft processes it feels out of control. It does not just synchonise expected user data. It inappropriately populates and copies undocumented files into system folders and, without any knowledge or intervention from the user, replicates them across devices.

The mitigation is you must live without synchronisation in Microsoft applications. So far it has worked 100%. Turning off sync across applications does work. This can be done during an OS install by refusing all sync options when prompted. You must also make sure it is off in the account settings for the user. This can be done from the settings panel when logged on to Windows. There are many guides available like this one from Process.st. Even with sync off, you can still access email and other services using the web applications, which will sync files and emails but will not store these to the local machine.

If like myself, you have lost trust in the applications themselves, removing windows apps entirely may be more fitting, this allows the folder

microsoft.windowscommunicationsapps_8wekyb3d8bbwe

to be deleted and does not appear, like a lurking background threat at a later date just in case you change your mind. My gaming rig has only one MS app remaining, Xbox and that is the way it will stay until the situation is openly discussed by MS and the vulnerability resolved. No more Appdata Phishes please.

In summary, no amount of phishing training will prevent a bad design in the operating system. Caching malware infected attachments to system folders and replicating them is bad design in my opinion. In this case, the operating system has been phished, not the human.

Other Recent Tux Machines' Posts

Tux Machines' Upcoming Community Events and Web Autonomy [original]
There's a lot to be celebrated
Running Old Windows Inside GNU/Linux (WSL9x)
2 new links
Fedora Linux 44 Is Now Available for Download, Here’s What’s New
Fedora Linux 44 distribution is now available for download powered by Linux kernel 6.19 and featuring the latest GNOME 50 and KDE Plasma 6.6 desktop environments, and many other enhancements.
 
MX Linux 25.2 Enters Public Beta Testing with New Text Mode Installer
MX Linux 25.2 is now available for public beta testing based on the Debian 13.4 release and featuring a new text mode installer, as well as numerous other installer improvements.
Debian's next release just made it near-impossible for tampered binaries to sneak onto your PC
The Linux community has been working on solving the attack vector
Why I just can't love Linux Mint
Linux Mint is a stable, reliable, and user-friendly Linux distro that provides a smooth transition for Windows users coming to Linux
SpacemiT K3 integrates 8-core RISC-V CPU cluster and 60 TOPS AI engine
According to Banana Pi Open Source Hardware on social media
Pi Slate – A Raspberry Pi 5 handheld Linux cyberdeck with a 5-inch 1920×720 touchscreen display
We previously wrote about Carbon’s CyberT, a Blackberry-style Raspberry Pi CM4 handheld Linux cyberdeck designed for Kali Linux and penetration testing
Alexandre Oliva: software in the public domain
When I was a kid learning to write my first programs in a programmable calculator with a 1-line display and some 1.4K "program steps" (whatever that meant) of memory
Free and Open Source Software
This is free and open source software
Review: Fedora 44
Fedora is a Linux distribution which probably needs no introduction
Sipeed launches K3 Pico-ITX and CoM260 boards with SpacemiT RISC-V SoC
Sipeed also lists software support for Bianbu OS, Ubuntu 26.04, OpenHarmony 6.0, OpenKylin, Deepin, and Fedora on the K3 Pico-ITX platform
9to5Linux Weekly Roundup: May 10th, 2026
The 291st installment of the 9to5Linux Weekly Roundup is here for the week ending May 10th, 2026.
Today in Techrights
Some of the latest articles
GNU/Linux Leftovers
mostly from Valnet
Homelabs and private cloud workspace at home
a couple more picks from Valnet
Red Hat/Fedora: Bazzite 44 Update, Flatseal, Qubes OS
4 picks for today, mostly from Valnet
Gaming With Android and With GNU/Linux
2 Valnet articles
Terminal: Fish vs Bash, cURL, and Powerful Command-Like Utilities
recent articles from Valnet
Audacious 4.6 Media Player Promises File Browser Plugin, Beta Out Now
Audacious 4.6 open-source media player is now available for public beta testing with a File Browser plugin, a macOS Now Playing plugin, support for playing Musepack SV8 files, and much more.
New Releases of Distributions and Operating Systems: Sculpt OS, Grml, Commodore OS, and Linux Lite
4 recent releases
Free, Libre, and Open Source Software Leftovers
FOSS picks
Web and Standards Leftovers
browsers and more
Programming Leftovers
Development news
Security Leftovers (Lots of Scaremongering Over Linux for Yet-Unknown Bug)
Security stories
GNU/Linux, BSD, and Mobile Platforms
mostly GNU/Linux leftovers
Remove-after Annotations for Debian Files and Packaging Amazfish for Debian
Debian picks
Retro, SBCs, 8-bit, and More
Open Hardware and old things resuscitated
GNU/Linux distributions without systemd, Russell Coker on Systemd, Mobile Linux, and Containers; HaikuOS, running different GNU/Linux distros directly in your browser, and EasYOS
distro news
today's howtos
Instructionals/Technical picks
Android Leftovers
How to join (or leave) the Android Auto beta while it's still open
KDE Dolphin does file management better than GNOME—here's why
I'm not currently a KDE user—I prefer GNOME, but I'm happy to give kudos where kudos are due
Aurora is the KDE side of Bluefin, and it might be the most polished Linux desktop right now
I'm a huge fan of Linux's KDE. It's my favorite desktop environment by far
Linux mascot Tux the penguin hits 30 years old — Linus Torvalds outlined the design of the 'slightly overweight penguin' on May 9, 1996
The contented penguin had to be overweight like it had eaten a bucketful of herring
Gentoo Linux has always been a bit of a fascinating distro
Here is a fact-based summary of the story contents:
Why Linux is my IDE
I treat my Linux system, with its array of programming tools
GNU/Linux and Free Software Leftovers
mostly GNU/Linux news
FFmpeg 8.1.1 Released with Numerous Fixes & Improvements (PPA Updated)
FFmpeg, the popular multimedia library, released new 8.1.1 version few days ago
Microsoft's Code Entrapment (Microsoft GitHub) in Trouble a Month After Its Chief Quietly Quits Microsoft
more bad news for them
Free and Open Source Software
This is free and open source software
Good Job Dell and Lenovo! Hope Others Follow You
Lenovo and Dell are now funding the service that ships firmware to millions of Linux devices
Shelly 2.2.4 Arch Linux GUI Package Manager Brings Smarter Fuzzy Search
Shelly 2.2.4 open-source graphical package manager for Arch Linux distributions is now available for download with various improvements. Here’s what’s new!
Today in Techrights
Some of the latest articles
Parrot 7.2 Is Now Officially Available for Download with “Copy Fail” Patch
Parrot 7.2 penetration testing distribution is now available for download with updated tools, security patches, and Linux kernel 6.19.13. Here’s what else is new!
Firefox 150.0.2 Improves Webcam Support, Split View, PDF Viewer, and More
Firefox 150.0.2 open-source web browser is now available for download with improvements to the Split View feature, built-in PDF viewer, search suggestions, video calls, and more.
Giada 1.4.1 Open-Source Loop Machine Adds MIDI Control for Switching Scenes
Giada 1.4.1 open-source loop machine and music production software is now available for download with support for switching scenes via keyboard or MIDI, displaying inactive scenes, and more.
Fighting for Software Freedom (Even in the Courtrooms) [original]
Fighting for freedom
Security Leftovers
Security picks
Godot 4.6.3 RC 1, Kdenlive 26.04.1, and More Leftovers
today's leftovers
Free, Libre, and Open Source Software Leftovers
FOSS picks for today, also standards
Mozilla: Thunderbird Contributor Spotlight on Bogomil Shopov and Data Collection at Mozilla
Mozilla picks
Content Management Systems (CMS) / Static Site Generators (SSG): WordPress News and Three Years in on the 11ty Bundle
3 news items
GNU Projects: GNUtrition 0.33.0rc1, Free Software Directory Meeting, and More
GNU related news
Programming Leftovers
Development news
OpenSUSE Planet News Roundup Tumbleweed Development Report
SUSE/OpenSUSE leftovers
Red Hat Leftovers
mostly from Red Hat's official site
Open Hardware/Modding: Android, Linux, Arduino, and SBCs
hardware relates stories
Audiocasts/Shows: Hackaday Podcast and Emacs Chat
2 episodes
tooday's howtos
Instructionals/Technical stories
Linux Vulnerability Mitigations (Bugs With 'Brands', Premature Disclosures)
kernel holes talked about
Games: "How do you Pew?" and More
mostly from GamingOnLinux
PrismLinux 2026.05.05 sports a redesigned installer, the Linux kernel 7.0, more
While sporting a wide range of fixes and tweaks as usual
Free and Open Source Software
This is free and open source software
RuscaLinux – Debian-based Linux distribution optimized for Italian-speaking users
RuscaLinux is a Debian-based Linux distribution optimized for Italian-speaking users
This Week in Plasma: ICC profiles ❤️ HDR
This week saw a lot of lower-level technical improvements made throughout Plasma’s software stack
KDE Frameworks 6.26 Improves Support for Kirigami and QtQuick-Based Apps
KDE Frameworks 6.26 open-source software suite is out now with various improvements and bug fixes for KDE apps and the Plasma desktop environment. Here’s what’s new!
Stable kernels: Linux 7.0.5, Linux 6.18.28, Linux 6.12.87, Linux 6.6.138, Linux 6.1.171, Linux 5.15.205, Linux 5.10.255, Linux 6.1.172, and Linux 5.15.206
I'm announcing the release of the 7.0.5 kernel
Cyber Show Going Static [original]
Maybe the future of the Web is static and lightweight
A Simple One-Click Mitigation for ‘Copy Fail’ and ‘Dirty Frag’ for Debian, Ubuntu, Mint, and Other Debian‑Based Distros
A trusted Debian dev turns scary new kernel bugs into a temporary one‑click fix until distros ship permanent patches
Today in Techrights
Some of the latest articles