Researchers Uncover Flaws in Windows Smart App Control and SmartScreen

Cybersecurity researchers have identified design weaknesses in Microsoft’s Windows Smart App Control and SmartScreen, which could allow threat actors to gain initial access to target environments without triggering any alerts.

Smart App Control (SAC) is a cloud-powered security feature introduced by Microsoft in Windows 11. It aims to block malicious, untrusted, and potentially unwanted apps from running on the system. If SAC cannot predict an app’s behavior, it checks whether the app is signed or has a valid signature before allowing it to execute.

SmartScreen, released with Windows 10, is a similar security feature that assesses whether a website or a downloaded app is potentially malicious. It employs a reputation-based approach for URL and app protection.

“Microsoft Defender SmartScreen evaluates a website’s URLs to determine if they’re known to distribute or host unsafe content,” Redmond notes in its documentation. “It also provides reputation checks for apps, examining downloaded programs and the digital signature used to sign a file. If a URL, file, app, or certificate has an established reputation, users don’t see any warnings. If there’s no reputation, the item is marked as a higher risk and presents a warning to the user.”

When SAC is enabled, it replaces and disables Defender SmartScreen.

“Smart App Control and SmartScreen have fundamental design weaknesses that can allow initial access with no security warnings and minimal user interaction,” Elastic Security Labs reported to The Hacker News.

One of the easiest ways to bypass these protections is by getting an app signed with a legitimate Extended Validation (EV) certificate, a technique already exploited by malicious actors to distribute malware, as seen in the case of HotPage.

Other methods for detection evasion include:

– Reputation Hijacking: Identifying and repurposing apps with a good reputation to bypass the system (e.g., JamPlus or a known AutoHotkey interpreter).

– Reputation Seeding: Using an attacker-controlled binary that appears innocuous to trigger malicious behavior due to a vulnerability in an application or after a certain time has elapsed.

– Reputation Tampering: Altering sections of a legitimate binary (e.g., calculator) to inject shellcode without losing its overall reputation.

– LNK Stomping: Exploiting a bug in the way Windows shortcut (LNK) files are handled to remove the mark-of-the-web (MotW) tag and bypass SAC protections. This involves crafting LNK files with non-standard target paths or internal structures. When clicked, these LNK files are modified by explorer.exe with canonical formatting, removing the MotW label before security checks are performed.

Elastic Security Labs found in-the-wild exploits using LNK stomping as early as February 2018, based on artifacts submitted to VirusTotal, indicating that threat actors have been aware of this bypass for years.

“Reputation-based protection systems are a powerful layer for blocking commodity malware,” the company said. “However, like any protection technique, they have weaknesses that can be bypassed with some care. Security teams should scrutinize downloads carefully in their detection stack and not rely solely on OS-native security features for protection in this area.”

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Sign Up for CXO Digital Pulse Newsletters

Sign Up for CXO Digital Pulse Newsletters to Download the Research Report

Sign Up for CXO Digital Pulse Newsletters to Download the Coffee Table Book

Sign Up for CXO Digital Pulse Newsletters to Download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch