1 min read

Beware New Windows Vulnerability With Remote Search Window Access

You may not know the name Matthew Hickey, but you should thank him for a recent discovery that could save you a lot of grief.

Hickey is the co-founder of a company called Hacker House.  He recently discovered a flaw that could allow for the opening of a remote search window simply by opening a Word or RTF document.

This newly discovered zero-day vulnerability is about as serious as it gets.

Here’s how it works:

A specially crafted Word Document or RTF is created which, when launched, will automatically launch a “search-MS” command, which opens a Windows Search window.

This window lists executable files on a remote share and the share can be given any name the attacker desires such as “Critical Updates” and the like. That would naturally prompt an unsuspecting user to click the file name to run that file.

Naturally, clicking the file name wouldn’t do anything other than install malware, which is exactly what the hackers are trying to do.

Although not quite as dangerous as the MS-MSDT remote code execution security flaw, this one is still incredibly serious. Even worse, there is not currently a patch that will make your system safer.

The good news however, is that there are steps you can take to minimize your risks.

If you’re worried about this security flaw, here’s what you can do:

  • Run Command Prompt as Administrator.
  • To back up the registry key, execute the command “reg export HKEY_CLASSES_ROOTsearch-ms search-ms.reg”
  • Execute the command “reg delete HKEY_CLASSES_ROOTsearch-ms /f”

Kudos to the sharp eyes of Matthew Hickey for first spotting this flaw.  We can only hope when the next zero-day rears its head, researchers like Mr. Hickey will be there to help point them out and show us how to defeat them.

Used with permission from Article Aggregator

Is Your IT Team Fried? The Psychology Behind Project Success

Is Your IT Team Fried? The Psychology Behind Project Success

You wouldn't try to run high-end gaming software on a laptop from 2005. You know the processor would overheat, the fans would scream, and the system...

Read More
Case Closed? Don’t Celebrate Yet. Here’s Your Document Guide

Case Closed? Don’t Celebrate Yet. Here’s Your Document Guide

The verdict is in. The settlement ink is dry. The client is relieved, and frankly, so are you. The adrenaline of the trial or the negotiation...

Read More
Small Law Firm, Big Personality: Your IT Should Match

Small Law Firm, Big Personality: Your IT Should Match

When choosing an IT partner, small law firms often face a frustrating dilemma. They're pushed toward generic, one-size-fits-all solutions designed...

Read More

Mobile Devices Connected to Windows Known as Phone Link

Microsoft recently announced that it was doing a bit of re-branding.

Read More

Update Your All In One SEO Plugin For Security Patch

Do you own and operate a WordPress website? Do you also use the “All in One” SEO plugin?

Read More

Tricky Ransomware Encrypts Small Data But Overwrites Large Data

The MalwareHunterTeam recently discovered a new ransomware operation that is particularly nasty. Called Onyx, outwardly, the operation does what most...

Read More