New FileFix Attack Can Bypass Windows MoTW: How to Protect Your Computer?
FileFix is a new attack method that takes advantage of the way Windows and browsers handle the HTML web page saving process to bypass Windows security checks. If done correctly, it can compromise Windows systems to launch ransomware attacks , harvest login credentials, and even install new malware. This guide lists all the measures you can take to protect your PC from the FileFix attack.
How the FileFix attack works
Revealed by security researcher mr.d0x, FileFix takes advantage of the way Windows handles local HTML application files and the Mark of the Web (MoTW) security feature. Whenever you save a web page using the "Save as" function, your browser will not tag the web page for MoTW, which is supposed to require security features (like Windows Security ) to scan the file.
Additionally, if the file is saved as an .hta (HTML application file), it can be executed directly as the current user without any security checks. If a malicious website convinces a user to save the page and also renames it to an .hta extension, malicious code will be downloaded and executed (when the user opens the file) without being detected by Windows security.
The main difficulty is convincing users to save the malicious page as an HTML application file. However, like EDDIESTEALER, this can be done using cleverly executed social engineering attacks , such as convincing users to save their MFA code with a specific name ending in .hta.
Fortunately, there are several blocking points to block this attack on PC. Here are the most reliable ones.
Avoid malicious websites
The attack starts by caching a malicious website, so if you don't visit the malicious site, you won't be targeted by this attack (and many others). Make sure you're using a modern browser like Chrome, Edge, Firefox, etc., as they have built-in anti- phishing and anti-malware protection. Also, on Chrome, turn on Enhanced Protection for AI-based protection that detects threats in real time.
Malicious websites are often distributed via phishing emails to pretend to be legitimate sites, so learn how to recognize phishing emails and avoid clicking on them as much as possible. If you accidentally land on a suspicious site without warning, there are ways to determine whether the site is legitimate or not.
Show file extensions in Windows
By default, Windows 11 hides file extensions and only shows the file name. FileFix indirectly takes advantage of this, as users may not notice the .html extension changing to .hta when the file extension is not visible. You can enable this feature to always see what the original file type was and whether it has been changed.
In File Explorer, click the See more button (three dots) and select Options .
Here, go to the View tab and uncheck the Hide extensions for known file types option .
Now you will always see the file extension even in the download window when saving a web page.
Change .hta file association to Notepad
By default, Mshta is an application that runs .hta files to execute HTML application functions directly. However, if you change the .hta file association to Notepad, the application will open the file in a text editor when executed. So even if someone tricks you (or someone else on your PC) into downloading a malicious .hta file, it will not execute.
This won't affect most users as the use of .hta scripts is fairly limited and is typically only used by IT admins or for some legacy scripts in corporate environments. Unless you are heavily reliant on .hta scripts, this won't affect you.
In Windows Settings, go to Apps -> Default Apps and search for '.hta' in the top search bar under Set a default for a file type or link type .
Now, click on Microsoft (R) HTML Application host , select Notepad as the default application and click Set default . Now, all .hta files will open in Notepad.
You should read it
- Activate Credential Guard to enhance Windows 10 security
- How to protect your computer from Thunderspy attack
- 7-zip adds an extremely important security feature on Windows
- Configure Windows XP SP2 network protection technologies on a computer
- Protect yourself against IE security holes
- Appeared worm computer attack AMD processor chip
- Instructions for using anti-malware feature on Windows 10
- Dell introduces a tool to protect PCs from BIOS attacks when working remotely
May be interested
- What is 51% attack? How does 51% attack work?the 51% attack refers to a potential attack on the integrity of the blockchain system, in which a single malicious actor or organization tries to control more than half of the network's total hash power, .
- How to Use Rufus to Bypass TPM and Secure Boot Requirements in Windows 11you can use registry hacks and modified iso files to bypass windows 11's tpm 2.0 and secure boot requirements. however, we recommend using rufus instead.
- Learn to use lesson computer 16 - Protect your computerwhat can you do to protect your computer system as much as your important data from potential external threats?
- Web5: SQL injection - Some techniques to bypass the filtering mechanismin this article, tipsmake.com will learn with you about ways to bypass the filtering mechanism in sql injection.
- How to protect your computer from Thunderspy attackthunderspy is a security attack technique on hardware devices and the article will guide tips against it.
- How to bypass TPM 2.0 requirement when installing Windows 11?how to install windows 11 (skip tpm 2.0 and secure boot)? detailed instructions on how to fix this pc can't run windows 11 error, fix the error of not being able to install windows 11
- Detecting APT attack campaign on important national infrastructure on Tet holidaythe main purpose of hackers is to gain user control, then through it to attack internal computer systems to steal important information.
- Steps to set Windows 11 computer password to better protect your informationsetting a password for your computer or laptop is an extremely necessary thing to protect it. so how to set a password for a windows 11 computer, see now
- What is PetitPotam Attack? How to overcome PetitPotam attackpetitpotam is a new attack method with the ability to take control of a domain controller and then take over the entire windows domain.
- ZIP bomb can protect websites from hackerswebsite owners can now use a tool called zip bomb to damage the port scanner, hacker website vulnerability and prevent him from accessing his website.