installer

Tech Optimizer
July 5, 2025
Cybercriminals are using legitimate software installer frameworks like Inno Setup to distribute malware, taking advantage of its trusted appearance and scripting capabilities. A recent campaign demonstrated how a malicious Inno Setup installer can deliver information-stealing malware, such as RedLine Stealer, through a multi-stage infection process. This process includes evasion techniques like detecting debuggers and sandbox environments, using XOR encryption to obscure strings, and conducting WMI queries to identify malware analysis tools. The installer retrieves a payload from a command-and-control server via a TinyURL link and creates a scheduled task for persistence. The payload employs DLL sideloading to load HijackLoader, which ultimately injects RedLine Stealer into a legitimate process to steal sensitive information. RedLine Stealer uses obfuscation techniques and disables security features in browsers to avoid detection. The Splunk Threat Research Team has developed detection methods focusing on indicators such as unsigned DLL sideloading and suspicious browser behaviors. Indicators of Compromise (IOC): - Malicious Inno Setup Loader Hash 1: 0d5311014c66423261d1069fda108dab33673bd68d697e22adb096db05d851b7 - Malicious Inno Setup Loader Hash 2: 0ee63776197a80de42e164314cea55453aa24d8eabca0b481f778eba7215c160 - Malicious Inno Setup Loader Hash 3: 12876f134bde914fe87b7abb8e6b0727b2ffe9e9334797b7dcbaa1c1ac612ed6 - Malicious Inno Setup Loader Hash 4: 8f55ad8c8dec23576097595d2789c9d53c92a6575e5e53bfbc51699d52d0d30a
Winsage
June 25, 2025
The CachyOS installer offers an aesthetically pleasing yet somewhat confusing installation experience, particularly regarding the Bootloader selection, where the default is Systemd-boot instead of the more familiar Grub. Additionally, the additional package installer lacks sufficient context, which may confuse users. The installation process has become more streamlined compared to the past, where users had to deal with multiple ISO images and CDs. Now, one can easily create a Live USB using software like Rufus, Raspberry Pi Imager, or Balena Etcher. A Live USB allows users to test the operating system before installation and serves various purposes such as troubleshooting and data recovery. The author is installing CachyOS on a Lenovo X390 laptop with 8GB of RAM and an Intel Core i5-8265U.
Tech Optimizer
June 13, 2025
A new strain of Windows malware called "BrowserVenom" is exploiting interest in DeepSeek's AI models by targeting users through deceptive Google ads. These ads lead to a counterfeit website, "https[:]//deepseek-platform[.]com," where users are tricked into downloading a harmful file named “AILauncher1.21.exe.” This malware monitors and manipulates internet traffic, allowing attackers to intercept sensitive data. The operation is believed to involve Russian-speaking threat actors, and the malware has infected users in several countries, including Brazil, Cuba, Mexico, India, Nepal, South Africa, and Egypt. The fraudulent domain has been suspended, but the malware can evade many antivirus solutions. Users are advised to verify official domains when downloading software.
Winsage
June 1, 2025
The author's PC experienced significant issues while trying to run DOOM: The Dark Ages, primarily due to problems with NVIDIA RTX graphics drivers on a system equipped with an Intel Core i7-14700K and NVIDIA RTX 5080. The Windows 11 Start Menu became unresponsive, leading to a complete system failure despite attempts to roll back and update drivers. The author used a USB drive with a Linux installer as a temporary solution but continued to face crashes. Attempts to reinstall Windows were complicated by an incorrectly formatted USB stick, which needed to be exFAT. Ultimately, the author resolved the issues by wiping both SSDs and creating fresh partitions. The author also noted the complexity and bloat of Windows 11 compared to the simplicity of ChromeOS, which has become a reliable alternative for tasks and gaming.
Winsage
May 30, 2025
The orchestrator manages updates by scheduling them based on user activity, system performance, and power availability. It supports MSIX/APPX and Win32 applications and provides custom installer support through additional executable packages. Users receive updates via Windows notifications, and a consolidated update history is available in system settings. The orchestrator aims to deliver a consistent management experience across Windows 11 products, offering centralized logs and policy enforcement for IT teams. However, enterprises with hybrid or air-gapped systems require robust support for localized deployment. The unified platform may raise compliance concerns for organizations with strict regulatory requirements, necessitating clear accountability between independent software vendors and Microsoft, along with pre-deployment validation.
Search