Windows Smart App Control, SmartScreen-Umgehung wird seit 2018 ausgenutzt

Teilen:

A design flaw in Windows Smart App Control and SmartScreen that enables attackers to launch programs without triggering security warnings has been under exploitation since at least 2018.

Smart App Control is a reputation-based security feature that uses Microsoft’s app intelligence services for safety predictions and Windows’ code integrity features to identify and block untrusted (unsigned) or potentially dangerous binaries and apps.

It replaces SmartScreen in Windows 11, a similar feature introduced with Windows 8 designed to protect against potentially malicious content (SmartScreen will take over when Smart App Control is not enabled). Both features are activated when the user attempts to open files tagged with a Mark of the Web (MotW) label.

As Elastic Security Labs discovered,  a bug in the handling of LNK files (dubbed LNK stomping), can help threat actors bypass Smart App Control security controls designed to block untrusted applications.

LNK stomping involves creating LNK files with non-standard target paths or internal structures. When a user clicks on such a file, explorer.exe automatically modifies the LNK files to use the correct canonical formatting.

However, this also removes the MotW (Mark of the Web) label from downloaded files, which Windows security features use to trigger a security check.

To exploit this design flaw, one can append a dot or space to the target executable path (for instance, after a binary’s extension like “powershell.exe.”) or create an LNK file containing a relative path, such as “.\target.exe”.

When the user clicks the link, Windows Explorer will look for and identify the matching .exe name, correct the full path, remove the MotW by updating the file on disk, and launch the executable.

Elastic Security Labs believes this weakness has been abused in the wild for years, given that it found multiple samples in VirusTotal designed to exploit it, the oldest of which was submitted more than six years ago.

It also shared these findings with the Microsoft Security Response Center, which said the issue “may be fixed in a future Windows update.”

Elastic Security Labs also described other weaknesses that attackers can exploit to bypass Smart App Control and SmartScreen, including:

  • Signed malware: signing malicious payloads using code-signing or Extend Validation (EV) signing certificates.
  • Reputation hijacking: finding and repurposing apps with a good reputation to bypass the system.
  • Reputation seeding: deploying attacker-controlled binaries onto the system (e.g., an application with known vulnerabilities or malicious code that triggers only if certain conditions are met).
  • Reputation tampering: injecting malicious code in binaries without losing associated reputation.

“Smart App Control and SmartScreen have a number of fundamental design weaknesses that can allow for initial access with no security warnings and minimal user interaction,” Elastic Security Labs warned.

“Security teams should scrutinize downloads carefully in their detection stack and not rely solely on OS-native security features for protection in this area.

“We are releasing this information, along with detection logic and countermeasures, to help defenders identify this activity until a patch is available.”

Elastic Security Labs researcher Joe Desimone has released an open-source tool for checking a file’s Smart App Control trust level.

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
2:16 am, Juni 21, 2025
Wetter-Symbol 18°C
L: 16° | H: 19°
klarer Himmel
Luftfeuchtigkeit: 76 %
Druck: 1020 mb
Wind: 7 mph ENE
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 0%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:43 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
16° | 19°°C 0.2 mm 20% 10 mph 71 % 1020 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
18° | 26°°C 0.34 mm 34% 15 mph 77 % 1013 mb 0 mm/h
Mo. Juni 23 10:00 pm
Wetter-Symbol
15° | 23°°C 0 mm 0% 14 mph 75 % 1016 mb 0 mm/h
Di. Juni 24 10:00 pm
Wetter-Symbol
15° | 25°°C 0.2 mm 20% 14 mph 72 % 1016 mb 0 mm/h
Mi. Juni 25 10:00 pm
Wetter-Symbol
17° | 21°°C 1 mm 100% 10 mph 85 % 1011 mb 0 mm/h
Today 4:00 am
Wetter-Symbol
17° | 18°°C 0 mm 0% 4 mph 71 % 1020 mb 0 mm/h
Today 7:00 am
Wetter-Symbol
19° | 20°°C 0 mm 0% 6 mph 56 % 1019 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
27° | 27°°C 0 mm 0% 8 mph 34 % 1018 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
31° | 31°°C 0 mm 0% 9 mph 25 % 1017 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
32° | 32°°C 0 mm 0% 10 mph 23 % 1016 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
26° | 26°°C 0 mm 0% 9 mph 27 % 1014 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
25° | 25°°C 0.2 mm 20% 5 mph 39 % 1014 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
21° | 21°°C 0.34 mm 34% 7 mph 66 % 1013 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€89,576.16
-1.29%
Ethereum(ETH)
€2,093.25
-4.33%
Fesseln(USDT)
€0.87
0.00%
XRP(XRP)
€1.84
-2.27%
Solana(SOL)
€121.49
-4.53%
USDC(USDC)
€0.87
0.01%
Dogecoin(DOGE)
€0.141019
-4.81%
Shiba Inu(SHIB)
€0.000010
-2.24%
Pepe(PEPE)
€0.000009
-3.00%
Peanut das Eichhörnchen(PNUT)
€0.218233
13.10%
Nach oben scrollen