The exploit allows attackers to package malware within .7z archives that, when extracted, do not carry the usual "warning" flag that Windows uses for files downloaded from the internet.
Implementing rules to block suspicious archive behavior.
How bypassing MoTW reduces the "friction" for a user to accidentally execute malware.
The incident highlights risks in software like 7-Zip that lacks built-in automatic update mechanisms.
Experts at the University of Calgary recommend: Updating to 7-Zip version 24.09 or later immediately.
Attackers use specifically crafted archive headers to trick 7-Zip into skipping the MoTW propagation.