Tuesday, March 4, 2025
HomeCyber Security NewsBeware !! Hackers Deliver FlawedAmmyy RAT via Weaponized Microsoft Word and PDF...

Beware !! Hackers Deliver FlawedAmmyy RAT via Weaponized Microsoft Word and PDF Documents

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals spreading powerful FlawedAmmyy RAT via Weaponized Microsoft Word and PDF Attachments to spy victims device and steal the sensitive information Remotely.

Hackers always lookout for legitimate programs or application to evade detection and to execute code with minimal user interaction.

Matt Nelson from SpecterOps recently published research on how attackers could abuse “.SettingContent-ms” file formats to run arbitrary commands on the latest version of windows.

Bad Actors Adopted  – FlawedAmmyy RAT

The SettingContent-ms file introduced in Windows 10, it is an XML document used to create shortcuts to various Windows 10 setting pages. Proofpoint researchers observed TA505 hacking group using this new technique to spread FlawedAmmyy RAT.

Threat actors embed the SettingContent-ms file inside the Microsoft Word and PDF documents. “The interesting aspect of this file is the <DeepLink> element in the schema. This element takes any binary with parameters and executes it.”

So if the users open a PDF file attachment with an embedded SettingContent-ms file, then windows would automatically run SettingContent-ms file and the PowerShell command contained within the “DeepLink” which leads to download and execute the FlawedAmmyy RAT.

The FlawedAmmy RAT functions
Remote Desktop control
File system manager
Proxy support
Audio Chat

Researchers observed the campaign first on June 18 and later on July 16 a large campaign with hundreds of thousands of messages attempting to deliver PDF attachments with an embedded SettingContent-ms file.

“TA505 acting as an early adopter, adapting the abuse of SettingContent-ms files to a PDF-based attack delivered at significant scale. We will continue to monitor ways in which threat actors use this approach in the weeks to come.” Proofpoint researchers said.

To best way to defend this attack is to block.SettingContent-ms, with the Microsoft recent update on the list of dangerous files to block within Office 365 documents, “.SettingContent-ms” file has been added.

Also Read:

Beware of FlawedAmmyy-RAT that Steals Credentials and Record Audio Chat

Beware!! Google Map Vulnerability Allows an Attacker to Redirect Victims into Malicious Websites

Powerful APT Malware “Slingshot” Performs Highly Sophisticated Cyber Attack to Compromise Router

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...