Microsoft disables MSIX ms-appinstaller protocol handler in Windows (Feb. 2022)

Windows[German]After ransomware like Emotet or BazarLoader abused the MSIX ms-appinstaller protocol handler, Microsoft has now reacted again. The entire MSIX ms-appinstaller protocol handler has been disabled in Windows for the time being – more or less as protection against Emotet, BazarLoader or similar malware. This is now the second measure after being patched in December 2021.

Continue reading

Posted in Security, Windows | Tagged , | Leave a comment

Edge 98.0.1108.43

Edge[German]Microsoft has updated the Chromium Edge browser to version 98.0.1108.43 as of February 3, 2022 (thanks to the reader for pointing this out). It is a new development branch that keeps up with Google Chrome (see Chrome 98.0.4758.8x released, 27 vulnerabilities fixed), but also fixes vulnerabilities. Microsoft has introduced new features and new group policies with Edge 98.

Continue reading

Posted in browser, Software, Update, Windows | Tagged | Leave a comment

Windows Server 2019: Is Update KB5010791 causing a Boot Loop?

Update[German]Question for the administrators of Windows Server 2019 systems: What are your experiences regarding the January 11, 2022 updates and boot loops. On Domain Controllers, the boot loops are well known, but Microsoft has released out-of-band updates with a fix. But I have now received reports that a Windows Server 2019 running stably so far with update KB5009557 had forced the servers into a boot loop with update KB5010791. Continue reading

Posted in issue, Update, Windows | Tagged , , , | Leave a comment

Windows: ESET virus scanners have a LPE vulnerability

Sicherheit (Pexels, allgemeine Nutzung)[German]Slovakian antivirus vendor ESET has issued a warning for users of its Windows products. Certain antivirus products have a Local Privilege Escalation (LPE) vulnerability CVE-2021-37852 in older versions. This allows a local attacker to gain SYSTEM privileges from a default account. However, ESET now provides security updates to close the vulnerability.

Continue reading

Posted in Security, Software, Windows | Tagged , | Leave a comment

Cyberattack on Oiltanking: Black Cat ransomware group responsibe, also for Colonial Pipeline Hack

Sicherheit (Pexels, allgemeine Nutzung)[German]An addendum to the cyberattack of Saturday, January 29, 2022 on Oiltanking, a company belonging to the Hamburg-based Marquard & Bahls group, and the IT of Mabanaft, an oil trader belonging to the same group. The crippled parts of the critical infrastructure (CRITIS), because the loading systems of Oiltanking no longer work, have their cause in an infection with the Black Cat ransomware. And that's where it gets interesting, because it seems to be the same cybercriminals who were responsible for the ransomware attack on Colonia Pipeline in the US in 2021

Continue reading

Posted in Security | Tagged , | Leave a comment

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


admin.microsoft.com and Office 365 Admin Center down (Feb. 3, 2022)

Stop - Pixabay[German]Microsoft's admin.microsoft.com sub-domain is down, which means that many admin centers for Microsoft services (Office 365, etc.) are no longer accessible. Here is a quick overview of what is known so far. Addendum: It seems to affect Europe, Middle East and Africa. The cause is also hinting – an update to the cloud stuff went wrong. Microsoft is rolling everything back and hopes to fix the problem with that.

Continue reading

Posted in Cloud, issue | Tagged , | Leave a comment

Chrome 98.0.4758.8x released, fixes 27 vulnerabilities

[German]Google has released updates to Google Chrome 98.0.4758.80/81/82 for Windows and 98.0.4758.80 for Mac and Linux on February 1, 2022. The Android browser has been updated to version 98.0.4758.87 and the iOS version to 98.0.4758.85. The updates close 27 vulnerabilities. Some vulnerabilities are classified as High. Here is a brief overview.

Continue reading

Posted in browser, Security, Software, Update | Tagged , , | Leave a comment

Microsoft Office Updates (February 1, 2022) fixes Access issues

[German]On February 1, 2022 (first Tuesday of the month, Office Patchday), Microsoft releases non-security updates for still-supported versions of Microsoft Office. This month, there are updates for Microsoft Office 2013 and 2016 that address the Access issue of only one user being able to open a database. Here's a brief overview.

Continue reading

Posted in issue, Office, Update | Tagged , , | Leave a comment

Malicious CSV files can install BazarBackdoor

Sicherheit (Pexels, allgemeine Nutzung)[German]Cyber criminals have found a way to abuse text-based CSV files in order to install BazarBackdoor malware on victims' systems. Security researchers probably came across this fact while monitoring a phishing campaign. The culprit is the ability to access the Dynamic Data Exchange (DDE) function from within Microsoft Excel from CSV files. I'm including the case here in the blog so that administrators in corporate environments can react to it if necessary.

Continue reading

Posted in Office, Security, Windows | Tagged , , | Leave a comment

Cyber attack on German Oiltanking shuts down tank terminal, Dutch Shell also affected

Sicherheit (Pexels, allgemeine Nutzung)[German]Oiltanking, a German company belonging to the Hamburg-based Marquard & Bahls group, has been the victim of a cyberattack. In addition, the IT of the mineral oil trader Mabanaft, which belongs to the same group, is also said to have been affected. As a result, a critical infrastructure (CRITIS) has been paralyzed, as Oiltanking's fuel loading systems are shut down. The German Shell fuel service station chain is also affected.

Continue reading

Posted in Security | Tagged | Leave a comment