Microsoft Edge’s security alerts vulnerable to tech support scam abuse

2 minute read

Home » News » Microsoft Edge’s security alerts vulnerable to tech support scam abuse

While Microsoft Edge is touted as more secure than Chrome and Firefox, the browser’s security alert is susceptible to technical support scam abuse. A security researcher has discovered a vulnerability in Edge that could let scammers display a fake security alert for any domain.

Manuel Caballero, who maintains the Broken Browser blog, found that scammers could also customize the text for the fake alerts to lure unsuspecting users into calling tech support numbers. The call center operators, in fact, would trick the victims into shelling out large sums of fees.

Caballero noted that the malicious campaign is nothing new. However, he acknowledged that scammers are advancing their trick to fool more users. He wrote in a blog post:

“They render red warnings or BSODs with fake messages and sometimes they even throw blocking alerts to prevent users from going away. When a user closes the alert box a new one appears, ad infinitum.”

Flaw exists in Edge’s SmartScreen security feature

Caballero said the security bug exists in Edge’s SmartScreen security feature, adding that the flaw is unique only to Edge. SmartScreen works to detect drive-by downloads and phishing URLs so that it displays a security alert inside the browser window.

The warning messages reside in Edge’s installation protocols ms-appx: and ms-appx-web. Edge uses these protocols to show warning messages when the browser detects phishing or malware delivery sites.

The security researcher explained that the flaw could not only allow hackers to extract the protocols and customize the warning messages, but it also lets cyber crooks fake the URL in Edge’s address bar. Scammers could also append a hash and forge a technical support scam page so that the spoofing appears authentic. Likewise, unsuspecting users would think a website they visit is legitimate, when in fact it is being spoofed.

The vulnerability could serve as an effective tool for tech support scammers to mask their attack with a legitimate URL. Also, there’s currently no fix for the flaw, according to Caballero, who claimed Microsoft ignored his reports in the past.

Read also:

Discussions

Next up

Fix: Action Only Valid for Products Currently Installed

Tashreef Shareef avatar. By: Tashreef Shareef
3 minute read

While trying to launch one of the Microsoft Office programs, you may encounter an error that won’t let you access any of the Microsoft Office […]

Continue Reading

Can’t delete an email folder in Outlook? Follow these steps

John Taylor avatar. By: John Taylor
3 minute read

If you frequently send emails, especially in a business environment, then you most probably know Microsoft Outlook. This email client comes pre-installed with Microsoft Windows […]

Continue Reading

FIX: Epic Games Store can’t download content on PC

John Taylor avatar. By: John Taylor
2 minute read

The gaming industry is now filled with an abundance of means through which players can get new games. The most prominent method one could think […]

Continue Reading