Fake Windows Update Site Tricks French-Speaking Users into Installing Infostealer

Convincing Fake Microsoft Support Site Distributes Infostealer to French Users via Malvertising

HIGH
April 9, 2026
4m read
MalwarePhishing

Related Entities

Products & Tech

WiX Toolset

Other

Infostealer

Full Report

Executive Summary

Researchers at Malwarebytes have uncovered a malvertising campaign specifically targeting French-speaking Windows users with a sophisticated infostealer. The campaign uses a typosquatted domain, microsoft-update[.]support, to host a meticulously crafted fake Microsoft support page. The page lures visitors into downloading a supposed cumulative update for Windows version 24H2. The download is an 83 MB Windows Installer package (.msi) that has been spoofed to appear legitimate but instead installs malware designed to harvest passwords, payment card details, and other sensitive credentials from the victim's machine.


Threat Overview

This campaign combines several effective techniques to achieve its goal of malware distribution.

  1. Malvertising: The attackers place malicious ads on legitimate websites to drive traffic to their fake support page.
  2. Typosquatting & Impersonation: The domain microsoft-update[.]support is chosen to sound official, and the website itself is a pixel-perfect copy of a real Microsoft page, complete with a plausible KB article number. This builds a false sense of trust.
  3. Social Engineering: The site uses a clear call to action—a large blue 'Download' button—to trick users into initiating the download, preying on their desire to keep their systems secure and updated.
  4. Trojanized Installer: The downloaded file, WindowsUpdate 1.0.0.msi, is a trojan. It uses the legitimate WiX Toolset installer framework to package the malware, a technique that can help bypass simple signature-based antivirus. The file's properties are also spoofed to list 'Microsoft' as the author.
  5. Payload: The final payload is an infostealer that steals a wide array of credentials.

Researchers speculate that the specific targeting of French users may be an attempt to capitalize on recent major data breaches in France, as victims of those breaches might be more susceptible to related scams.

Technical Analysis

Impact Assessment

A successful infection results in the comprehensive theft of a user's personal and financial information.

  • Financial Theft: Stolen payment card details can be used for fraudulent purchases.
  • Account Takeover: Stolen passwords for email, social media, and banking sites can lead to account takeovers, further fraud, and identity theft.
  • Corporate Compromise: If the infected machine is used for work, the stolen credentials could include VPN, RDP, or corporate web portal logins, providing the attacker with an initial foothold into a corporate network.

IOCs

Type Value Description
domain microsoft-update[.]support The malicious typosquatted domain.
file_name WindowsUpdate 1.0.0.msi The malicious installer file.
file_hash_sha256 (Not provided) Hash of the malicious MSI file.

Detection & Response

  1. Network Filtering: Block access to the known malicious domain microsoft-update[.]support at the network perimeter (firewall, web proxy).
  2. Endpoint Detection: EDR/EPP solutions should be able to detect and block the execution of the malicious .msi file based on its hash or behavioral analysis. Monitor for processes created by msiexec.exe that exhibit suspicious behavior, such as making network connections or dropping files in temp directories.
  3. User Reporting: Encourage users to report suspicious websites or unexpected software update prompts.

D3FEND Reference: Detection would involve D3-UA - URL Analysis at the web proxy to block the malicious domain, and D3-FH - File Hashing on the endpoint to block the known malicious installer.

Mitigation

  • User Education: Train users to never download software updates from third-party websites. Windows updates should only ever be installed via the official Windows Update feature in the OS settings or through managed enterprise tools like WSUS or SCCM.
  • Browser Protection: Use web browsers with robust protection against malicious websites and downloads.
  • Application Control: In a corporate environment, use application control to prevent users from installing unauthorized software. Standard users should not have the administrative rights required to install most .msi packages system-wide.

D3FEND Reference: The most effective mitigation is preventing the malicious file from running, which can be achieved through D3-EAL - Executable Allowlisting or user training.

Timeline of Events

1
April 4, 2026
The malicious Windows Installer package was created, according to its file properties.
2
April 9, 2026
This article was published

MITRE ATT&CK Mitigations

Educate users to only download software updates from official, built-in OS mechanisms and never from third-party websites.

Use web filters and DNS filtering to block access to known malicious and typosquatted domains.

Mapped D3FEND Techniques:

Use application control policies to prevent users from installing unauthorized software.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The fake Microsoft update campaign relies on directing users to a malicious typosquatted domain. A primary and highly effective countermeasure is DNS Denylisting, also known as DNS filtering. By subscribing to reputable threat intelligence feeds, an organization's DNS resolver or web proxy can be configured to block any attempt to resolve the malicious domain microsoft-update[.]support. When a user clicks on the malvertisement and their browser tries to navigate to the site, the DNS request is blocked, and the user never reaches the fake page. This prevents the social engineering attack and the malware download from ever occurring. This technique is highly scalable and provides a strong first line of defense against a wide range of web-based threats.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

MalwareInfostealerPhishingMalvertisingMicrosoftFrance

📢 Share This Article

Help others stay informed about cybersecurity threats