Monday, April 28, 2025
HomeCyber Security NewsHackers Target Job Seekers Using Malicious Microsoft Word Document

Hackers Target Job Seekers Using Malicious Microsoft Word Document

Published on

SIEM as a Service

Follow Us on Google News

Researchers at Cisco Talos revealed a malicious campaign that deploys Cobalt Strike beacons on compromised hosts. The attack involves a multistage and modular infection chain with fileless, malicious scripts.

This attack is a email with a malicious Microsoft Word document attachment which exploits the vulnerability tracked as (CVE-2017-0199), a remote code execution issue in Microsoft Office.

“If a victim opens the maldoc, it downloads a malicious Word document template hosted on an attacker-controlled Bitbucket repository”, Cisco

- Advertisement - Google News

Cisco Talos analyzed two different attack techniques, both targeting job seekers with malicious documents installing Cobalt Strike.

Initially, the email is themed to lure the recipient to review the attached Word document and give some of their personal information.

Initial malicious email message

Researchers explain that the malicious documents resembles the contents of a declaration form of the U.S. Office of Personnel Management (OPM), which serves as the chief human resources agency and personnel policy manager for the U.S. federal government.

US govt-themed phishing lure

In the second case, the malicious document has job offers advertising for roles related to delegating development, PSA plus, a well-known New Zealand trade union and administrative support for National Secretaries at the Public Service Association office based in New Zealand.

Attack Methodologies Employed by the Attacker

In the first attack, the downloaded DOTM template executes an embedded malicious Visual Basic script, leads to the execution of obfuscated VB, PowerShell scripts and malicious VB downloading and running a Windows executable that executes malicious PowerShell commands.

Researchers say “the payload is a leaked version of a Cobalt Strike beacon. The beacon configuration contains commands to perform targeted process injection of arbitrary binaries and has a high reputation domain configured, exhibiting the redirection technique to masquerade the beacon’s traffic”.

Overview of first attack method
First Attack Method

Talos researchers also noticed the usage of the ‘Redline information-stealer’ and ‘Amadey botnet executables’ as payloads.

In the second method, the attack is modular but using less sophisticated Visual Basic and PowerShell scripts. Here, the attacker used a 64-bit Windows executable downloader which executes the PowerShell commands responsible for downloading and running the Cobalt Strike payload.

Second Attack Method

Therefore, defenders should apply behavioral protection capabilities in the organization’s defense to effectively protect them against fileless threats. Organisations should be cautious on the Cobalt Strike beacons and implement layered defense capabilities.

Cyber Attack with Zero Trust Networking – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...