Mark of the Web explained

The Mark of the Web (MoTW) is an identifier used by Microsoft Windows to mark files downloaded from the Internet as potentially unsafe. It is implemented as an NTFS Zone.Identifier alternate data stream (ADS) containing an identifier element which indicates (with the "Mark") that a file saved on a computer could contain harmful or malicious content because it was downloaded from an external source ("the Web").[1] [2]

The Mark of the Web can also be added as an HTML comment inserted by a web browser when downloading an HTML document from the Internet, noting the URL the document was saved from.[3]

Effects

Because it is a feature of NTFS, the Mark of the Web only affects files opened on computers running the Microsoft Windows operating system.[4] Windows warns a user running a Web-marked executable file that it had been downloaded from the Internet and could be harmful; the user can opt either to continue or cancel execution. Unless overridden by user action the mark prevents macros from running in Microsoft Office files.[5] Visual Studio projects created with Web-marked files cannot be built or executed.[6]

Some archiving software propagates the MoTW from the archive itself to files extracted from it, preventing its security protection being bypassed by malware distributed within an archive.[7] [8]

Bypasses

There have been Windows vulnerabilities, some of which have been corrected by a patch, that allow the Mark of the Web to be bypassed by malicious actors. CVE-2022-41091 was added to the National Vulnerability Database on November 8, 2022, and refers to the now patched ability of a malicious actor to avoid files downloaded from the Internet being Web-marked.[9] [10] Other vulnerabilities (CVE-2022-44698, patched in December 2022;[11] CVE-2023-36584, patched in October 2023)[12] allowed malicious actors to bypass the restrictions of the mark without removing it.

An attacker may also use social engineering to convince a target user to unblock the file by right-clicking it and changing the file properties.[13]

Notes and References

  1. News: Abrams . Lawrence . Microsoft fixes Windows zero-day bug exploited to push malware . BleepingComputer . 10 November 2022 .
  2. Web site: Lawrence . Eric . 2016-04-04 . Downloads and the Mark-of-the-Web . 2024-01-09 . text/plain . en.
  3. Web site: kexugit . 2011-03-23 . Understanding Local Machine Zone Lockdown . 2024-01-09 . Microsoft Learn . en-us.
  4. Web site: nicholasswhite . 2023-12-14 . Macros from the internet are blocked by default in Office - Deploy Office . 2024-01-09 . Microsoft Learn . en-us.
  5. Web site: 11 October 2023 . 21 February 2019 . Macro Security for Microsoft Office . National Cyber Security Center (NCSC) . 3.0.
  6. Web site: Nagel . Eric . 2019-08-26 . Remove the Mark of the Web: Visual Studio 2019 Build Error . 2024-01-09 . Eric Nagel . en-US.
  7. Web site: Wixey . Matt . Are threat actors turning to archives and disk images as macro usage dwindles? . Sophos News . 12 October 2022 . 28 February 2024.
  8. News: Boyd . Christopher . 7-Zip gets Mark of the Web feature, increases protection for users . Malwarebytes . 21 June 2022 .
  9. Web site: CVE-2022-41091 . 2024-01-09 . NIST National Vulnerability Database.
  10. Web site: 2022-11-08 . Windows Mark of the Web Security Feature Bypass Vulnerability . 2024-01-09 . Microsoft MSRC.
  11. Web site: CVE-2022-44698 . 2024-01-09 . NIST National Vulnerability Database.
  12. Web site: 2023-10-10 . CVE-2023-36584 . 2024-06-18 . NIST National Vulnerability Database.
  13. Web site: Hegt . Stan . 2020-03-30 . Mark-of-the-Web from a Red Team's Perspective . 2024-06-19 . Outflank.