<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Url-Scheme — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/url-scheme/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 07:33:40 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/url-scheme/feed.xml" rel="self" type="application/rss+xml"/><item><title>WINDSHIFT APT Abuses Custom URL Schemes for macOS Infection</title><link>https://feed.craftedsignal.io/briefs/2024-01-windshift-mac-url-scheme/</link><pubDate>Thu, 07 May 2026 07:33:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-windshift-mac-url-scheme/</guid><description>The WINDSHIFT APT group is infecting Macs by abusing custom URL schemes, where advertising support for a custom URL scheme in an application's Info.plist causes the application to be automatically launched when a URL with that scheme is opened, allowing attackers to remotely compromise systems with minimal user interaction and creating an initial access vector.</description><content:encoded><![CDATA[<p>The WINDSHIFT APT group is utilizing a novel infection mechanism to compromise macOS systems, observed as early as 2018. This method involves exploiting custom URL schemes, allowing for remote exploitation with limited user interaction. By crafting a malicious application that registers a custom URL scheme, attackers can trigger its execution when a user interacts with a specially crafted link (e.g., via a web page or email). This initial access can then be leveraged for further exploitation, such as bypassing System Integrity Protection (SIP) or dumping the keychain. This technique has been successfully used against government targets in the Middle East.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious application designed to register a custom URL scheme (e.g., <code>windshift://</code>). This is done by modifying the application&rsquo;s <code>Info.plist</code> file to include the <code>CFBundleURLTypes</code> key with the custom URL scheme.</li>
<li>The victim downloads or saves the malicious application to their file system.</li>
<li>macOS automatically registers the custom URL scheme when the application is saved to disk. This triggers an XPC message to the <code>launchservicesd</code> daemon.</li>
<li>The <code>launchservicesd</code> daemon parses the application&rsquo;s <code>Info.plist</code> file, extracts the custom URL scheme, and registers it in its database.</li>
<li>The attacker delivers a crafted link (e.g., via email or a web page) using the registered custom URL scheme (e.g., <code>&lt;a href=&quot;windshift://payload&quot;&gt;Click here&lt;/a&gt;</code>).</li>
<li>The victim clicks on the malicious link.</li>
<li>The operating system consults its registered URL schemes and launches the malicious application.</li>
<li>The malicious application executes arbitrary code, potentially downloading and installing further payloads, exfiltrating data, or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows the attacker to gain initial access to a macOS system. This can lead to the execution of arbitrary code, data exfiltration, and the installation of persistent backdoors. The WINDSHIFT APT group has successfully used this technique against government targets in the Middle East. If successful, this attack could result in the compromise of sensitive information, disruption of services, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for applications launched via custom URL schemes. Implement the <code>Detect Suspicious Custom URL Scheme Execution</code> Sigma rule to identify potential exploitation attempts.</li>
<li>Inspect application <code>Info.plist</code> files for suspicious or unexpected <code>CFBundleURLTypes</code> entries, especially during software installation or updates.</li>
<li>Educate users about the risks associated with clicking on untrusted links, even if they appear to be benign.</li>
<li>Enable process monitoring and auditing to capture details about process execution and file system changes.</li>
<li>Consider implementing application control policies to restrict the execution of unsigned or untrusted applications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>macos</category><category>url-scheme</category><category>apt</category></item></channel></rss>