Categories: CVE/vulnerability

New Zero Day Attack Discovered in MS Word Document Uses to Hack your PC – Still Not yet Patched

[jpshare]

MS word Document is on of the main Vector to easily spread the Macro viruses to the Victims. an undisclosed vulnerability has been Discovered in  Microsoft Office RTF( Rich Text Format) Document.

FireEye Security Researchers Said, This vulnerability allows a malicious actor to execute a Visual Basic script when the user opens a document containing an embedded exploit.This vulnerability found as Windows Object Linking and Embedding (OLE) based attack.

Different Well-known  Families  Malware payload inject into the Office documents and exploiting the vulnerability that downloads and executes within it.

Attack Method

According to the FireEye, attack involves a threat actor emailing a Microsoft Word document to a targeted user with an embedded OLE2link object.

This Malware basically spreading through the Email with Attached Malware Embedded Word Document files. Once victims Click the Document file, will automatically Execute the Payload into Victims Machine, winword.exe issues a HTTP request and Establish a connection with Command & Control Server where Attackers Control the Victims machine.

winword.exe. Included in Microsoft’s Office Suite, Word is a powerful word processor. Primarily a tool for typing and editing documents, Word can export into many formats and included many add-ons from Microsoft. 

Once loads and executes the malicious script, it will automatically terminate the winword.exe process and drop the additional payload, FireEye said.

The original winword.exe process is terminated in order to hide a user prompt generated by the OLE2link.

This Zero Day Critical Vulnerability has been Reported by FireEye to Microsoft Security Team and Still patch not yet Ready To Publically disclose the Technical Analysis of this Vulnerability.

Also Read:

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

DeepSeek is Now Available With Microsoft Azure AI Foundry

Microsoft has officially added DeepSeek R1, an advanced AI model, to its Azure AI Foundry…

12 minutes ago

New Apple SLAP & FLOP Side-Channel Attacks Let Attackers Steal Login Details From Browser

Researchers from the Georgia Institute of Technology and Ruhr University Bochum have uncovered two novel…

12 hours ago

Hackers Exploit OAuth 2.0 Code Flow Using AiTM Attack on Microsoft Azure AD

Security enthusiasts and professionals are turning their focus towards a new angle on phishing attacks…

12 hours ago

Russian APT28 Hackers Exploit Zero-Day Vulnerabilities to Target Government and Security Sectors

A detailed analysis from Maverits, a leading cybersecurity firm, reveals a significant evolution in the…

12 hours ago

Lynx Ransomware Architecture to Attack Windows, Linux, ESXi Uncovered

The emergence of the Lynx Ransomware-as-a-Service (RaaS) platform has drawn significant attention in cybersecurity circles,…

12 hours ago

WhatsApp’s “View Once” Feature Flaw Let Anyone View the Image Unlimitedly

Privacy is the cornerstone of digital communication in today’s world, and platforms like WhatsApp consistently…

17 hours ago