Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Researchers Demonstrate New Windows Smart App Control and SmartScreen Bypass Techniques

    Researchers Demonstrate New Windows Smart App Control and SmartScreen Bypass Techniques

    August 5, 2024

    Researchers have uncovered additional weaknesses in the Windows SmartScreen system first introduced in Windows 8, along with Smart App Control (SAC), an evolution of SmartScreen designed to add significant protection against new and emerging threats by blocking apps that are malicious or untrusted.

    These new techniques could potentially allow attackers to bypass operating system-level security measures without triggering warnings or pop-ups.

    Windows Smart App Control and SmartScreen

    When enabled, SAC replaces and disables Defender SmartScreen. Microsoft also exposes undocumented APIs for querying the trust level of files for SmartScreen and SAC, allowing researchers to develop utilities that display the trust of a file.

    Researchers from Elastic Labs studied reputation-based and LNK (shortcut) file-based techniques to bypass both systems and gain further access to devices.

    Exploiting Reputation Systems to Bypass SmartScreen

    One method to circumvent SAC involves signing malware with legitimate code-signing certificates. Attackers have increasingly obtained Extended Validation certificates, which require identity verification, by impersonating businesses. The SolarMarker threat group, for instance, has used over 100 unique signing certificates in their campaigns.

    Source: https://www.elastic.co/security-labs

    Another tactic, known as reputation hijacking, involves repurposing trusted applications to bypass security checks. Script hosts with foreign function interfaces, such as Lua and Node.js interpreters, are particularly vulnerable to this approach. Attackers can use these trusted applications to load and execute malicious code without triggering alerts.

    Reputation hijacking can be difficult to detect, as countless applications can be co-opted to carry out the technique. However, security teams can develop behavioral signatures to identify general categories of abused software.

    For example, these teams can look for common Lua or Node.js function names or modules in suspicious call stacks, or use local reputation to identify outliers in their environment for closer inspection.

    LNK File Vulnerability and Detection Strategies

    A significant discovery involves a bug in Windows’ handling of LNK (shortcut) files. By crafting LNK files with non-standard target paths, attackers can bypass Mark of the Web (MotW) checks, effectively sidestepping SmartScreen and SAC protections. This vulnerability, which has existed for at least six years, allows for arbitrary code execution without security warnings.

    To counter these threats, security teams should implement multi-layered detection strategies. This includes cataloging and blocking known abused applications, developing behavioral signatures to identify suspicious activities, and closely monitoring downloaded files.

    For example, teams can create rules to detect common function names or modules associated with hijacked script hosts in call stacks. Additionally, focusing on local reputation systems can help identify outliers in the environment that warrant closer inspection.

    SmartScreen have a number of fundamental design weaknesses that can allow for initial access with no security warnings and minimal user interaction. Security teams should scrutinize downloads carefully in their detection stack and not rely solely on OS-native security features for protection in this area.

    The researchers single out in-memory evasion, persistence, credential access, enumeration, and lateral movement related behaviors as helpful for singling out reputation hijacking-based techniques in real scenarios.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMigrate an on-premises MySQL database to Amazon Aurora MySQL over a private network using AWS DMS homogeneous data migration and Network Load Balancer
    Next Article Optimizing IT Infrastructure: CFO Views on Attack Surface Management

    Related Posts

    Machine Learning

    Salesforce AI Releases BLIP3-o: A Fully Open-Source Unified Multimodal Model Built with CLIP Embeddings and Flow Matching for Image Understanding and Generation

    May 16, 2025
    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Leave A Reply Cancel Reply

    Hostinger

    Continue Reading

    Resorts In Gurgaon

    Development

    Firefox Nightly: arriva il gestore profili

    Linux

    Gravitee launches Federated API Management to help companies deal with API sprawl

    Development

    CVE-2023-26819 – cJSON Denial of Service (DoS)

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Development

    QNAP Patches New Flaws in QTS and QuTS hero Impacting NAS Appliances

    May 22, 2024

    Taiwanese company QNAP has rolled out fixes for a set of medium-severity flaws impacting QTS…

    6 Linux commands I can’t work without – and what I use them for

    January 23, 2025

    ChatGPT’s Operator launches for almost every part of the world

    February 21, 2025

    Deletion Vectors in Delta Live Tables: Identifying and Remediating Compliance Risks

    March 27, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.