Monday, November 25, 2024
HomeCVE/vulnerabilityNew Zero Day Attack Discovered in MS Word Document Uses to Hack...

New Zero Day Attack Discovered in MS Word Document Uses to Hack your PC – Still Not yet Patched

Published on

[jpshare]

MS word Document is on of the main Vector to easily spread the Macro viruses to the Victims. an undisclosed vulnerability has been Discovered in  Microsoft Office RTF( Rich Text Format) Document.

FireEye Security Researchers Said, This vulnerability allows a malicious actor to execute a Visual Basic script when the user opens a document containing an embedded exploit.This vulnerability found as Windows Object Linking and Embedding (OLE) based attack.

- Advertisement - SIEM as a Service

Different Well-known  Families  Malware payload inject into the Office documents and exploiting the vulnerability that downloads and executes within it.

Attack Method

According to the FireEye, attack involves a threat actor emailing a Microsoft Word document to a targeted user with an embedded OLE2link object.

This Malware basically spreading through the Email with Attached Malware Embedded Word Document files. Once victims Click the Document file, will automatically Execute the Payload into Victims Machine, winword.exe issues a HTTP request and Establish a connection with Command & Control Server where Attackers Control the Victims machine.

winword.exe. Included in Microsoft’s Office Suite, Word is a powerful word processor. Primarily a tool for typing and editing documents, Word can export into many formats and included many add-ons from Microsoft. 

Once loads and executes the malicious script, it will automatically terminate the winword.exe process and drop the additional payload, FireEye said.

The original winword.exe process is terminated in order to hide a user prompt generated by the OLE2link.

This Zero Day Critical Vulnerability has been Reported by FireEye to Microsoft Security Team and Still patch not yet Ready To Publically disclose the Technical Analysis of this Vulnerability.

Also Read:

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip,...

Helldown Ransomware Attacking VMware ESXi And Linux Servers

Helldown, a new ransomware group, actively exploits vulnerabilities to breach networks, as since August...

Volt Typhoon Attacking U.S. Critical Infra To Maintain Persistent Access

Volt Typhoon, a Chinese state-sponsored threat actor, targets critical infrastructure sectors like communications, energy,...