1 min read

Beware New Windows Vulnerability With Remote Search Window Access

You may not know the name Matthew Hickey, but you should thank him for a recent discovery that could save you a lot of grief.

Hickey is the co-founder of a company called Hacker House.  He recently discovered a flaw that could allow for the opening of a remote search window simply by opening a Word or RTF document.

This newly discovered zero-day vulnerability is about as serious as it gets.

Here’s how it works:

A specially crafted Word Document or RTF is created which, when launched, will automatically launch a “search-MS” command, which opens a Windows Search window.

This window lists executable files on a remote share and the share can be given any name the attacker desires such as “Critical Updates” and the like. That would naturally prompt an unsuspecting user to click the file name to run that file.

Naturally, clicking the file name wouldn’t do anything other than install malware, which is exactly what the hackers are trying to do.

Although not quite as dangerous as the MS-MSDT remote code execution security flaw, this one is still incredibly serious. Even worse, there is not currently a patch that will make your system safer.

The good news however, is that there are steps you can take to minimize your risks.

If you’re worried about this security flaw, here’s what you can do:

  • Run Command Prompt as Administrator.
  • To back up the registry key, execute the command “reg export HKEY_CLASSES_ROOTsearch-ms search-ms.reg”
  • Execute the command “reg delete HKEY_CLASSES_ROOTsearch-ms /f”

Kudos to the sharp eyes of Matthew Hickey for first spotting this flaw.  We can only hope when the next zero-day rears its head, researchers like Mr. Hickey will be there to help point them out and show us how to defeat them.

Used with permission from Article Aggregator

Your Cyber Defense Strategy Starts with Your IT Inventory

Your Cyber Defense Strategy Starts with Your IT Inventory

Imagine this: your law firm is facing a major cybersecurity audit. An auditor, clipboard in hand, asks a simple question: "Can you provide a complete...

Read More
Why Your Law Firm's Cybersecurity Depends on Continuing Education

Why Your Law Firm's Cybersecurity Depends on Continuing Education

You wouldn't trust a surgeon who stopped learning after medical school, so why would you trust your firm's digital security to someone whose...

Read More
The Great Legal Research Revolution: AI vs. Traditional Tools

The Great Legal Research Revolution: AI vs. Traditional Tools

The gavel has fallen, and the verdict is in: artificial intelligence has entered the courtroom and not as counsel, but as the most sophisticated...

Read More

Mobile Devices Connected to Windows Known as Phone Link

Microsoft recently announced that it was doing a bit of re-branding.

Read More

Update Your All In One SEO Plugin For Security Patch

Do you own and operate a WordPress website? Do you also use the “All in One” SEO plugin?

Read More

Tricky Ransomware Encrypts Small Data But Overwrites Large Data

The MalwareHunterTeam recently discovered a new ransomware operation that is particularly nasty. Called Onyx, outwardly, the operation does what most...

Read More