Fake Windows 11 24H2 Update Sites Steal Passwords and Cookies

  • Thread Author
A new wave of fake Windows 11 24H2 update sites is putting a familiar trust signal to dangerous use: the promise of a system update. Researchers say attackers are impersonating Microsoft support pages and luring users into downloading malware that can steal saved passwords, browser cookies, account sessions, and other sensitive data. In a threat landscape where “update” usually means safety, this campaign weaponizes routine maintenance into a credential-theft trap.

Background​

The latest campaign matters because it sits at the intersection of two long-running trends: the growing legitimacy of Windows Update as a distribution channel and the steady professionalization of infostealers. Microsoft has spent years making updates largely automatic, with Windows 11 designed to keep devices secure and current through regular servicing. That convenience has helped train users to expect update prompts and download pages to be normal, even desirable, which in turn gives criminals a potent social-engineering hook.
At the same time, attackers have learned that people are often less cautious when a lure looks operational rather than emotional. A fake invoice or banking alert still works, but a fake feature update works differently: it borrows from the user’s own maintenance habits. The Malwarebytes campaign described this specifically, noting a typosquatted domain dressed up like an official Microsoft support site and presenting a plausible update for Windows version 24H2. That detail is not cosmetic; it is the core of the deception.
The timing also matters. Microsoft’s current Windows 11 servicing model keeps 24H2 in active circulation, with ongoing cumulative updates and release-health notices that reinforce the idea that this version is current, normal, and safe to install. That means the average user can easily believe that a “24H2 update” page is believable, especially when the language and branding are polished enough to avoid immediate suspicion.
What makes this particular case more concerning is the blend of legitimacy and concealment. Malwarebytes says the package used the WiX Toolset, a legitimate installer framework, and that the malicious logic was buried inside an Electron-based application with hidden Python scripts. In other words, this is not a crude fake executable with obvious malware fingerprints; it is a layered delivery chain designed to look like routine software distribution while quietly extracting credentials in the background. That is the kind of tradecraft that defeats casual inspection.
This is also part of a broader ecosystem of “fake update” scams. Microsoft itself has warned for years that people can be tricked into installing fake updates when websites tell them to do so, and its security guidance repeatedly pushes users back toward official channels and away from external prompts. The lesson is old, but the execution keeps evolving. The criminals now borrow the exact visual language of software maintenance because users have been conditioned to trust it.

How the Campaign Works​

The attack chain begins with a lookalike website. According to Malwarebytes, the fraudulent page used a typosquatted domain and presented itself as Microsoft support, complete with branding and a download button for a supposed cumulative update. The site was initially observed in French, which suggests the operators are building a template they can localize and reuse across regions. That is a common trait of scalable scam infrastructure: the language changes, but the bait remains the same.

The lure​

The core pitch is simple. The victim is told they can install an early or special Windows 11 24H2 update and gain access to features or fixes. Because many users already expect updates to arrive through browsers, download buttons, and support pages, the scam does not need to invent a new behavior. It only needs to redirect an existing one. That small shift is enough to turn normal software hygiene into a vulnerability.
The malicious download is described as an MSI installer named WindowsUpdate 1.0.0.msi, around 83 MB in size, with spoofed metadata that lists Microsoft as the author. That matters because file size and publisher fields can calm a user who is checking only the most obvious signs. A large package feels “real,” and a familiar publisher name can lower resistance at exactly the wrong moment.

The delivery​

Once launched, the installer reportedly deploys an Electron-based app that runs hidden Python scripts. Those scripts are built to harvest browser-stored passwords, cookies, active sessions, and Discord data. That makes the malware more than a simple password stealer; it is an account takeover tool that can preserve access even after the victim changes one password, especially if session cookies or tokens have already been exfiltrated.
The campaign’s delivery method is significant because it uses trusted development components in untrusted ways. WiX Toolset is legitimate, Electron is legitimate, and Python is legitimate. The problem is not any single component; it is the adversarial orchestration of ordinary tools to create a convincing payload. This is exactly why “signed-looking” or “well-packaged” malware can be so dangerous.
  • Typosquatted domain mimicking Microsoft support
  • Fake Windows 11 24H2 update as the lure
  • MSI installer with spoofed metadata
  • Electron app used as a cover layer
  • Hidden Python scripts used for theft and exfiltration

Why 24H2 Is the Perfect Bait​

The use of Windows 11 24H2 is not accidental. Version names carry enormous psychological weight, especially when users are trying to keep up with Microsoft’s update cadence. When a campaign borrows a current or recently discussed version number, it gains credibility because the user has already heard the term somewhere else. That is one reason threat actors repeatedly anchor scams to the latest Windows release.

Familiarity as a weapon​

Microsoft’s servicing model reinforces this dynamic. Windows 11 receives cumulative updates, optional previews, and dynamic updates through normal channels, and Microsoft’s own support pages encourage users to stay current. The result is a constant stream of update-related language that can be mimicked with very little effort. For a scammer, the real product documentation creates the vocabulary; the fake site simply borrows it.
There is also a practical reason to anchor the lure around a “new” Windows release. People often expect compatibility issues, feature drops, or staged rollouts around major versions. A fake 24H2 download can therefore pretend to be a special case rather than an ordinary patch. That makes the deception feel more urgent and more plausible. Urgency is the scam’s real payload.

The trust transfer problem​

A key weakness in the user’s mental model is that many people do not distinguish between “a Windows update page” and “the Windows Update mechanism.” If a page looks official and mentions Microsoft, the trust transfer happens instantly. The attacker does not need to beat antivirus first; it is enough to get the user to click once.
This is a broader issue in the Windows ecosystem because support content, download pages, and troubleshooting pages are all part of the same user experience. That means the boundary between legitimate guidance and malicious imitation can feel thin to nontechnical users. In practice, the safest rule is blunt: if the update is not coming from Windows Update, Microsoft’s own download paths, or a clearly verified enterprise management channel, treat it as suspect.
  • Current version names are trust magnets
  • Official servicing language gets reused in scams
  • Perceived urgency lowers user scrutiny
  • Brand familiarity can outweigh technical caution

What the Malware Is Trying to Steal​

The stolen material described in the campaign is exactly what attackers want most in 2026: active identity, not just static credentials. Malwarebytes says the payload targets browser passwords, cookies, sessions, and Discord data, which can be enough to access email, social accounts, cloud services, and private communities without forcing the victim to re-enter passwords. That makes the theft durable and operationally valuable.

Cookies and sessions matter more than ever​

Passwords alone are bad enough, but session cookies often represent the real prize. If an attacker captures a live session, they may bypass even stronger passwords for a period of time, particularly if the victim is not using phishing-resistant multi-factor authentication. That is one reason cookie theft has become a central tactic in modern infostealer ecosystems.
The inclusion of Discord data is also telling. Discord accounts can contain communities, messages, linked payment methods, and login tokens that are useful both for direct abuse and for lateral abuse against other services. Attackers frequently prioritize whatever gives them a ready-made platform with existing trust relationships. Trust is easier to steal than to build.

Why browser-stored data is so valuable​

Modern browsers are convenient vaults, which is great for ordinary users and great for attackers too. Saved passwords, autofill data, and cookies can be bundled together into a single exfiltration package, turning one compromise into many. Once the attacker has that bundle, they can pivot across email, shopping, cloud storage, and social media with alarming speed.
This also explains why password managers and MFA matter, but not as a complete solution. Strong unique passwords reduce reuse damage, and authentication prompts raise the bar, yet stolen sessions can still undermine both defenses. The user may be “secure” in theory while the attacker is already inside in practice. That mismatch is one of the hardest problems in consumer security.
  • Browser passwords can expose multiple accounts
  • Cookies and sessions can bypass fresh logins
  • Discord data can enable additional abuse
  • Autofill data may reveal personal information
  • Active account sessions are especially dangerous

Evasion, Persistence, and Detection Gaps​

One of the most worrying details in the report is that early samples were said to have zero detections across 69 antivirus engines on VirusTotal. That does not mean the malware is invisible forever, but it does show how packaging, obfuscation, and legitimate tooling can buy attackers time. In security, time is often the difference between one victim and a campaign.

Why antivirus can miss it​

Traditional scanning tools are strongest when malware exposes obvious signatures or suspicious behaviors. A payload embedded inside a legitimate installer framework, paired with scripted logic and an Electron wrapper, can look innocuous long enough to slip through. The problem is compounded when the malicious actions are deferred until after installation, making the first-stage file seem cleaner than the behavior it later triggers.
Malwarebytes also noted persistence tactics. The software reportedly modifies the Windows registry with a SecurityHealth run key and plants a disguised Spotify.lnk shortcut in the startup folder. Those moves are small but effective because they let the malware relaunch after reboot without requiring the user to repeat the original mistake. Persistence is what turns a lapse into an incident.

What this means for defenders​

For defenders, the lesson is that file reputation alone is no longer enough. A file can be large, professionally packaged, and apparently unsigned by the standards a casual user notices, yet still be malicious. Security teams need behavioral controls, application allowlisting, endpoint telemetry, and browser hardening to catch what static detection misses.
The broader implication is that “clean at first glance” malware is now a standard expectation, not a novelty. If the first stage looks harmless, defenders should assume the second stage may be where the real damage happens. That is why threat hunting now leans heavily on process chains, script execution, registry changes, and unusual startup artifacts rather than on a single suspicious hash.
  • Packaged installers can evade simple scanning
  • Deferred payloads hide the worst behavior
  • Registry run keys support re-entry after reboot
  • Startup folder shortcuts are a low-friction persistence method
  • Behavioral detection is more important than ever

The Broader Threat Landscape​

This fake Windows update campaign is not isolated. Malwarebytes has documented a sequence of recent scams that use fake software downloads, fake support pages, and lookalike branding to distribute infostealers. In February, it reported Facebook ads spreading fake Windows 11 downloads that stole passwords and crypto wallet data. In November 2025, it described a fake Windows Update splash page used in ClickFix campaigns. The pattern is clear: Windows branding remains one of the most abused trust surfaces on the internet.

Why attackers keep returning to Windows​

Windows is still the dominant desktop operating system, which means any Windows-themed lure has a huge addressable audience. More importantly, system updates are universal and routine, so users do not need to be convinced that updates matter. Attackers are not selling a fantasy; they are parasitizing a real workflow. That makes the scam feel ordinary, which is exactly what makes it effective.
This trend also mirrors a larger move in cybercrime toward “infrastructure mimicry.” Instead of inventing novel themes, attackers copy the interfaces people already expect to see: Microsoft download pages, Google verification screens, browser login dialogs, and vendor support portals. The more successful the genuine service is, the more valuable its visual language becomes to criminals.

The role of public awareness​

Public awareness helps, but awareness alone is not enough. Many users know they should distrust random email attachments or obvious phishing links, yet a polished software-update page can bypass that caution because it feels operational rather than social. The challenge for security messaging is to make “look carefully at the domain” and “use official channels only” feel as natural as “don’t click suspicious links.”
It is also worth noting that the current Windows 11 environment adds complexity. Microsoft continues to publish release-health notes, KB articles, optional preview updates, and dynamic updates, which can overwhelm nontechnical users. The scammers benefit from that complexity because they only need the victim to be roughly right, not precisely informed.
  • Fake update lures are now a recurring pattern
  • Brand mimicry is becoming the norm
  • Windows’ market share makes it a prime target
  • Security awareness must include update hygiene
  • Complex update ecosystems can confuse users

Enterprise vs. Consumer Impact​

The consumer risk is straightforward: one bad download can expose personal email, banking, gaming, and social accounts. Home users often keep passwords in browsers, reuse credentials across services, and rely on convenience features like autofill, which increases the blast radius of a compromise. If a family PC is infected, the attacker may inherit not just one user’s identity but several people’s stored accounts and sessions.

Consumer exposure​

For consumers, the most dangerous misconception is that a fake update is “just” a malware issue. In reality, it is a full identity problem. If the malware steals browser cookies or session tokens, changing passwords after the fact may not immediately close the door, especially if the attacker has already exported data or established persistence. The clean-up is often more complicated than the initial click.
Consumers also tend to depend on visible cues, such as the Microsoft logo or a reassuring “download” button. That makes them vulnerable to brand impersonation. Microsoft’s own guidance urges users to stick to official sites, Windows Update, and trusted support channels, precisely because the fake versions are often close enough to fool anyone who is moving too quickly.

Enterprise implications​

Enterprises face a different challenge. A single endpoint compromise can become a foothold for further intrusion if the infected machine has access to SSO, corporate email, browser-saved admin credentials, or business apps authenticated by session cookies. In a managed environment, this can escalate from an isolated incident to a broader access risk if identity providers, password vaults, or remote management portals are exposed.
Enterprises should also note that employees may encounter these lures on personal machines and later reuse the same credentials at work. That makes password hygiene and phishing-resistant MFA more than a best practice; they are a containment strategy. The line between home and office identity is often thinner than policy assumes.
  • Consumers face immediate account theft risk
  • Families may have multiple accounts exposed on one device
  • Enterprises risk SSO and session-token compromise
  • Credential reuse amplifies damage across environments
  • Phishing-resistant MFA helps, but does not solve everything

What Users Should Do Now​

The first and most important step is to stop treating software updates as something to fetch from random web pages. Microsoft’s guidance is clear: use Windows Update or clearly verified Microsoft download channels, and avoid unsolicited prompts from websites claiming to offer special fixes. If a page tells you to install a Windows update manually, verify the domain first and assume it may be hostile until proven otherwise.

Immediate user actions​

If someone has already interacted with a suspicious “update,” they should disconnect the device from the network, scan with trusted security tools, and review browser-saved passwords, cookies, and active sessions. Because the malware described by Malwarebytes targets those exact items, account security should be treated as compromised even if the machine appears normal. Password changes should happen from a clean device, not the possibly infected one.
After that, users should remove suspicious startup entries, check for recently created shortcuts or registry run keys, and monitor email, cloud, and social accounts for unusual logins. In a consumer context, the most practical advice is also the most boring: keep Windows updated through the built-in mechanism, keep browsers and password managers current, and do not install updates from promotional sites. Boring security is usually good security.

Practical checklist​

  • Close the browser and disconnect from the internet if you suspect infection.
  • Scan with trusted antimalware from a clean state.
  • Change passwords from another device, starting with email and financial accounts.
  • Review active sessions and sign out of all devices where possible.
  • Check startup items and remove suspicious entries.
  • Enable or strengthen MFA on all important accounts.
  • Use Windows Update only for ordinary patching.
  • Do not trust update pages from ads or pop-ups
  • Do not reuse passwords across services
  • Do not change passwords from an infected PC
  • Do not ignore browser session theft
  • Do not assume antivirus alone will catch everything

Strengths and Opportunities​

The good news is that this campaign has exposed a set of clear defensive opportunities. Because the lure is recognizable, security teams can educate users more effectively; because the delivery chain is layered, defenders can hunt for behavioral indicators; and because the attack depends on browser and session theft, identity controls can do real work even after endpoint compromise. The problem is serious, but it is not mysterious.
  • User education can focus on one concrete behavior: verify update sources.
  • Browser hardening can reduce the value of stolen passwords and sessions.
  • Phishing-resistant MFA can blunt some account-takeover paths.
  • Application control can reduce the chance of arbitrary MSI installs.
  • Endpoint telemetry can catch suspicious registry and startup changes.
  • Incident response playbooks can be updated around browser-session theft.
  • Microsoft’s own update channels provide a clear baseline for legitimacy.

Risks and Concerns​

The larger risk is that the scam will evolve faster than users’ instincts. Once attackers prove they can mimic a Windows update with enough polish to evade casual scrutiny, they can reuse the same template against other versions, regions, and languages. The combination of legitimate tooling, credible branding, and session theft makes this a highly adaptable model.
  • Template reuse could expand the campaign quickly.
  • Localized versions may target non-English speakers more effectively.
  • Session theft can defeat password-only remediation.
  • AV blind spots may let early-stage samples spread.
  • Enterprise credential reuse can turn a home infection into workplace exposure.
  • User fatigue around constant updates can lower skepticism.
  • Legitimate installer frameworks can continue to be abused for cover.

Looking Ahead​

What happens next will likely depend on whether security vendors, browser makers, and Microsoft itself can keep turning update trust into a safer experience. Microsoft continues to publish servicing guidance and release-health information, but that same visibility gives attackers a blueprint for imitation. The best defense is not only technical filtering; it is making the official path so clear that lookalikes stand out faster.
For defenders, the next step is to assume that the next fake update will look even more polished. That means tightening controls around downloads, elevating domain verification, and treating browser-session security as a first-class incident response concern. In practical terms, the battle is no longer just about stopping malware files; it is about stopping trust abuse before the file is ever run.
  • Monitor for fake Microsoft domains and similar typosquats.
  • Train users to rely on built-in update paths only.
  • Harden browsers to limit credential and cookie harvesting.
  • Use MFA that resists token theft where possible.
  • Watch startup locations and registry run keys for persistence.
  • Treat update-themed downloads as high-risk by default.
The deeper lesson here is that software updates have become part of the social contract between operating systems and users, and attackers know it. As long as people equate “update” with “safe,” criminals will keep dressing malware in patch-day clothing. The only durable answer is a habit change: slow down, verify the source, and remember that in 2026, the most dangerous fake on the web may not look like a scam at all.

Source: AsatuNews.co.id Fake Windows 11 24H2 Update Site Steals User Passwords