Friday, February 7, 2025
HomeCVE/vulnerabilityNew Zero Day Attack Discovered in MS Word Document Uses to Hack...

New Zero Day Attack Discovered in MS Word Document Uses to Hack your PC – Still Not yet Patched

Published on

SIEM as a Service

Follow Us on Google News

[jpshare]

MS word Document is on of the main Vector to easily spread the Macro viruses to the Victims. an undisclosed vulnerability has been Discovered in  Microsoft Office RTF( Rich Text Format) Document.

FireEye Security Researchers Said, This vulnerability allows a malicious actor to execute a Visual Basic script when the user opens a document containing an embedded exploit.This vulnerability found as Windows Object Linking and Embedding (OLE) based attack.

Different Well-known  Families  Malware payload inject into the Office documents and exploiting the vulnerability that downloads and executes within it.

Attack Method

According to the FireEye, attack involves a threat actor emailing a Microsoft Word document to a targeted user with an embedded OLE2link object.

This Malware basically spreading through the Email with Attached Malware Embedded Word Document files. Once victims Click the Document file, will automatically Execute the Payload into Victims Machine, winword.exe issues a HTTP request and Establish a connection with Command & Control Server where Attackers Control the Victims machine.

winword.exe. Included in Microsoft’s Office Suite, Word is a powerful word processor. Primarily a tool for typing and editing documents, Word can export into many formats and included many add-ons from Microsoft. 

Once loads and executes the malicious script, it will automatically terminate the winword.exe process and drop the additional payload, FireEye said.

The original winword.exe process is terminated in order to hide a user prompt generated by the OLE2link.

This Zero Day Critical Vulnerability has been Reported by FireEye to Microsoft Security Team and Still patch not yet Ready To Publically disclose the Technical Analysis of this Vulnerability.

Also Read:

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Hackers Leveraging Image & Video Attachments to Deliver Malware

Cybercriminals are increasingly exploiting image and video files to deliver malware, leveraging advanced techniques...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Microsoft Sysinternals 0-Day Vulnerability Enables DLL Injection Attacks on Windows

A critical zero-day vulnerability has been discovered in Microsoft Sysinternals tools, posing a serious security threat...

7-Zip 0-Day Flaw Added to CISA’s List of Actively Exploited Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical 0-day vulnerability...

Logsign Vulnerability Allows Remote Attackers to Bypass Authentication

A critical security vulnerability has been identified and disclosed in the Logsign Unified SecOps...