Tuesday, May 6, 2025
HomeComputer SecurityHackers Compromised Bangladesh Embassy Website that Drops Weaponized Word Document with...

Hackers Compromised Bangladesh Embassy Website that Drops Weaponized Word Document with Malware

Published on

SIEM as a Service

Follow Us on Google News

Threat actors compromised the Bangladesh embassy in Cairo website and taking control to drops the weaponized word documents that contains privilege escalation flaw exploit (CVE-2017-7255).

Attackers are usually distributing various malware via malspam and phishing emails which includes some of the convince action take place in order to infect the victims.

But this is totally strange that the Government website is completely abused to drop the weaponized documents from each and every page the website.

- Advertisement - Google News

This incidents was observed by trustwave researchers when their Cloud SWG product block government facility domain.

Further research revealed that the website which is already in attackers control drops Microsoft Word document with an embedded malicious EPS script.

Whenever users accessing any page of the Bangladesh embassy in Cairo website, it suddenly drops the request to save a file, with only a few pieces of content.

Since the website control already taken by the intruders, they have an control to upload their own data and change the web server configuration.

According to Trustware researchers, “This office document contains an EPS file and exploits a use-after-free vulnerability, CVE-2017-0261. It seems that the EPS file was modified at the end of October 2018, which coincides with the timeline of the first infection dates we noticed.”

Once the EPS file will be executed then the exploit CVE-2017-7255 will be extracted that provides privilege escalation for the execution of the main payload.

In the final step of the infection process, a Godzilla loader is dropped to gather the victim’s system information and internet connectivity to communicate with the C2 server.

At the end, after it made the successful communication with its C2 server then it drops the additional downloader that finally launches the crypto miners.

“It is possible that the intruders who injected the web miner into the site decided to make a shift from web mining to machine infection in order to install a more persistent cryptominer on victim machines.” Researchers said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Winter Olympics Website Hacked & Downed About 12 Hours by Cyber Attack

Victorian Equal Opportunity & Human Rights Commission website hacked by Anonymous

Rail Operator website Hacked and Hackers asked to Pay Ransom in Bitcoins


Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Gunra Ransomware’s Double‑Extortion Playbook and Global Impact

Gunra Ransomware, has surfaced as a formidable threat in April 2025, targeting Windows systems...

Hackers Exploit 21 Apps to Take Full Control of E-Commerce Servers

Cybersecurity firm Sansec has uncovered a sophisticated supply chain attack that has compromised 21...

Hackers Target HR Departments With Fake Resumes to Spread More_eggs Malware

The financially motivated threat group Venom Spider, also tracked as TA4557, has shifted its...

RomCom RAT Targets UK Organizations Through Compromised Customer Feedback Portals

The Russian-based threat group RomCom, also known as Storm-0978, Tropical Scorpius, and Void Rabisu,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Gunra Ransomware’s Double‑Extortion Playbook and Global Impact

Gunra Ransomware, has surfaced as a formidable threat in April 2025, targeting Windows systems...

Hackers Exploit 21 Apps to Take Full Control of E-Commerce Servers

Cybersecurity firm Sansec has uncovered a sophisticated supply chain attack that has compromised 21...

Hackers Target HR Departments With Fake Resumes to Spread More_eggs Malware

The financially motivated threat group Venom Spider, also tracked as TA4557, has shifted its...