Tag Archive for: Word

Zero-Day Attack Exploits Windows via Malicious Word Doc

  1. Zero-Day Attack Exploits Windows via Malicious Word Doc  BankInfoSecurity.com
  2. Zero-day exploits resolved by Microsoft on May Patch Tuesday  TechTarget
  3. Microsoft’s Patch Tuesday fixes zero-day exploit and privilege escalation vulnerability  TechSpot
  4. Full coverage

zero day exploit – read more

Security Alert: Hackers Exploiting Microsoft Word To Infect Computers With Malware – Tech Times


Tech Times

Security Alert: Hackers Exploiting Microsoft Word To Infect Computers With Malware
Tech Times
Be careful when you receive a suspicious email with a Word document attached to it. Opening it might infect your computer with malware. Computer security experts have discovered a dangerous malware embedded in Microsoft Word documents. The hackers …

and more »

computer security news – read more

Booby-trapped Word documents in the wild exploit critical Microsoft 0day

(credit: Rob Enslin)

There’s a new zeroday attack in the wild that’s surreptitiously installing malware on fully-patched computers. It does so by exploiting a vulnerability in most or all versions of Microsoft Word.

The attack starts with an e-mail that attaches a malicious Word document, according to a blog post published Saturday by researchers from security firm FireEye. Once opened, exploit code concealed inside the document connects to an attacker-controlled server. It downloads a malicious HTML application file that’s disguised to look like a document created in Microsoft’s Rich Text Format. Behind the scenes, the .hta file downloads additional payloads from “different well-known malware families.”

The attack is notable for several reasons. First, it bypasses most exploit mitigations: This capability allows it to work even against Windows 10, which security experts widely agree is Microsoft’s most secure operating system to date. Second, unlike the vast majority of the Word exploits seen in the wild over the past few years, this new attack doesn’t require targets to enable macros. Last, before terminating, the exploit opens a decoy Word document in an attempt to hide any sign of the attack that just happened.

Read 4 remaining paragraphs | Comments

Technology Lab – Ars Technica