Researchers at Malwarebytes have uncovered a malvertising campaign specifically targeting French-speaking Windows users with a sophisticated infostealer. The campaign uses a typosquatted domain, microsoft-update[.]support, to host a meticulously crafted fake Microsoft support page. The page lures visitors into downloading a supposed cumulative update for Windows version 24H2. The download is an 83 MB Windows Installer package (.msi) that has been spoofed to appear legitimate but instead installs malware designed to harvest passwords, payment card details, and other sensitive credentials from the victim's machine.
This campaign combines several effective techniques to achieve its goal of malware distribution.
microsoft-update[.]support is chosen to sound official, and the website itself is a pixel-perfect copy of a real Microsoft page, complete with a plausible KB article number. This builds a false sense of trust.WindowsUpdate 1.0.0.msi, is a trojan. It uses the legitimate WiX Toolset installer framework to package the malware, a technique that can help bypass simple signature-based antivirus. The file's properties are also spoofed to list 'Microsoft' as the author.Researchers speculate that the specific targeting of French users may be an attempt to capitalize on recent major data breaches in France, as victims of those breaches might be more susceptible to related scams.
T1566.002 - Phishing: Spearphishing Link..msi file, which falls under T1204.002 - User Execution: Malicious File.T1027 - Obfuscated Files or Information.T1555 - Credentials from Password Stores.A successful infection results in the comprehensive theft of a user's personal and financial information.
| Type | Value | Description |
|---|---|---|
| domain | microsoft-update[.]support |
The malicious typosquatted domain. |
| file_name | WindowsUpdate 1.0.0.msi |
The malicious installer file. |
| file_hash_sha256 | (Not provided) | Hash of the malicious MSI file. |
microsoft-update[.]support at the network perimeter (firewall, web proxy)..msi file based on its hash or behavioral analysis. Monitor for processes created by msiexec.exe that exhibit suspicious behavior, such as making network connections or dropping files in temp directories.D3FEND Reference: Detection would involve D3-UA - URL Analysis at the web proxy to block the malicious domain, and D3-FH - File Hashing on the endpoint to block the known malicious installer.
.msi packages system-wide.D3FEND Reference: The most effective mitigation is preventing the malicious file from running, which can be achieved through D3-EAL - Executable Allowlisting or user training.
Educate users to only download software updates from official, built-in OS mechanisms and never from third-party websites.
Use web filters and DNS filtering to block access to known malicious and typosquatted domains.
Mapped D3FEND Techniques:
The fake Microsoft update campaign relies on directing users to a malicious typosquatted domain. A primary and highly effective countermeasure is DNS Denylisting, also known as DNS filtering. By subscribing to reputable threat intelligence feeds, an organization's DNS resolver or web proxy can be configured to block any attempt to resolve the malicious domain microsoft-update[.]support. When a user clicks on the malvertisement and their browser tries to navigate to the site, the DNS request is blocked, and the user never reaches the fake page. This prevents the social engineering attack and the malware download from ever occurring. This technique is highly scalable and provides a strong first line of defense against a wide range of web-based threats.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats