7.8
CVSSv3

CVE-2017-11882

Published: 15/11/2017 Updated: 16/03/2021
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 953
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an malicious user to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft office 2013

microsoft office 2010

microsoft office 2016

microsoft office 2007

Exploits

Source: githubcom/embedi/CVE-2017-11882 CVE-2017-11882: portalmsrcmicrosoftcom/en-US/security-guidance/advisory/ MITRE CVE-2017-11882: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2017-11882 Research: embedicom/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about Patch analysis: 0patchblo ...
This Metasploit module exploits a flaw in how the Equation Editor handles OLE objects in memory to execute arbitrary code using RTF files without interaction ...

Github Repositories

2018-2020青年安全圈-活跃技术博主/博客

Security-Data-Analysis-and-Visualization 2018-2020青年安全圈-活跃技术博主/博客 声明 所有数据均来自且仅来自公开信息,未加入个人先验知识,如有疑义,请及时联系root@4o4notfoundorg。 公开这批数据是为了大家一起更快更好地学习,请不要滥用这批数据,由此引发的问题,本人将概不负责。 对这

DeltaFlare Description This repository content a matrix with the references on legit software abused by Threat Actors for hunt by reuse TTPs methods Objectives This matrix has for objectives for to help to attribution to a Threat Actor that abuse again a legit software for theirs operations or for hunting the activities on the public sandboxes in checking new submissions This

some links gathering about penetration

Table of contents PentestInfo 0X01 Information Gethering IP And DNS Information leakage 0X02 Denial Of Service 0X03 Scan Identify Tools For Overall Scan Web Applications Scan Tools 0X04 Fuzz and Password 0X05 Password crack 0X06 System Vulnerability 0X07 Web Relevant Online Website 0X08 Existing Vulnerability Finding 0X09 Cheatsheet 0X10 Webshell And Payload 0X11 Code R

Simple Overflow demo, like CVE-2017-11882 exp

Overflow-Demo-CVE-2017-11882 Simple Overflow demo by strcpy text string, like CVE-2017-11882 exp Build Build with Visual Studio 2017( 2019 is working too, 2015 is not working) Project Config Project setting: c/c++ Optimization Optimization: Maximum Optimization (Favor Size) (/O1) Favor Size of Speed: Favor small code (/Os) Who

RTF_11882_0802 CVE-2017-11882 CVE-2017-11882: portalmsrcmicrosoftcom/en-US/security-guidance/advisory/CVE-2017-11882 MITRE CVE-2017-11882: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2017-11882 Research: embedicom/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about Patch analysis: 0patchblogspotru/2017/11/did-microsoft-just-man

some links gathering about penetration

Table of contents PentestInfo 0X01 Information Gethering IP And DNS Information leakage 0X02 Denial Of Service 0X03 Scan Identify Tools For Overall Scan Web Applications Scan Tools 0X04 Fuzz and Password 0X05 Password crack 0X06 System Vulnerability 0X07 Web Relevant Online Website 0X08 Existing Vulnerability Finding 0X09 Cheatsheet 0X10 Webshell And Payload 0X11 Code R

CVE-2018-0802 CVE-2018-08022: portalmsrcmicrosoftcom/en-US/security-guidance/advisory/CVE-2018-0802 MITRE CVE-2018-0802: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2018-0802 0patch exploitation and patch video: wwwyoutubecom/watch?v=XU-U4K270Z4 Qihoo 360 blog post wwwfreebufcom/vuls/159789html Checkpoint blog (brute-force ASLR by

CVE-2017-11882(通杀Office 2003到2016)

CVE-2017-11882概述 从漏洞利用效果来看,它可以通杀Office 2003到2016的所有版本,并且整个攻击环境的构建非常简单。 此漏洞是由Office软件里面的 [公式编辑器] 造成的,由于编辑器进程没有对名称长度进行校验,导致缓冲区溢出,攻击者通过构造特殊的字符,可以实现任意代码执行。 举个

Microsoft Office Memory Corruption Vulnerability CVE-2017-11882 March 25, 2019 Shannon and Iman Outline Background Vulnerability How does it work? Uses Violations How was it fixed? (solutions) What the patch does Example Background The code for Equation Editor was compiled in 2000 and was used in subsequent versions of Word It is run as a separate process and an attacker can

APT Analysis Report,fighting!

APT-Analysis-Report APT Analysis Report,fighting! APT-C-09 [1] CSDN APT攻击检测溯源与常见APT组织的攻击案例[EB/OL] (2020-05-11) blogcsdnnet/Eastmount/article/details/106009460 [2] Antiy 白象的舞步——来自南亚次大陆的网络攻击[EB/OL] (2016-07-18) wwwantiycom/response/WhiteElephant/WhiteElephanthtml [3] Fre

Proof-of-Concept exploits for CVE-2017-11882

CVE-2017-11882 CVE-2017-11882: portalmsrcmicrosoftcom/en-US/security-guidance/advisory/CVE-2017-11882 MITRE CVE-2017-11882: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2017-11882 Research: embedicom/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about Patch analysis: 0patchblogspotru/2017/11/did-microsoft-just-manually-patch-the

CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.

CVE-2017-11882 Exploit CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum For remote command execution,this exploit will call WinExec with SW_HIDE and call ExitProcess after WinExec returns For remote code execution,this exploit just jmp to code I cannot find a reference for the object structureso I cannot change the file length for arbitrary lengt

Tool to decode the encoded Shellcode of this type found in office documents

EquationEditorShellCodeDecoder Tool to decode the encoded Shellcode of this type found in office documents See the Blogpost to see how to use this pcsxcetrasupport3wordpresscom/2019/05/22/a-deeper-look-at-equation-editor-cve-2017-11882-with-encoded-shellcode/ I also have decoding notes for this sample in the 7Zip file The password is the standard infected just incas

CVE-2017-11882 原脚本来自于 githubcom/embedi/CVE-2017-11882 CVE-2017-11882: portalmsrcmicrosoftcom/en-US/security-guidance/advisory/ MITRE CVE-2017-11882: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2017-11882 Research: embedicom/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about Patch analysis: 0patchblogspotru

SignHere is implementation of CVE-2017-11882. SignHere is builder of malicious rtf document and VBScript payloads.

SignHere Introduction CVE-2017-11882 - The unique vulnerability identifier of Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allows an attacker to run code in the context of the current user without properly handling objects in memory, the so-called "Microsoft Office Memory corrupt

Malware samples, analysis exercises and other interesting resources.

   Malware Samples This repository is intended to provide access to a wide variety of malicious files and other artifacts All of the samples are in a password protected ZIP archive using a password of: infected Malware Analysis Exercises In addition to providing artifacts from samples, I will regularly post malware anlaysis exercises These exercises will c

-文章记录 100截断分析 2利用Excel 40宏执行任意命令 3IIS6_WebDAV远程代码执行漏洞(CVE-2017-7269)的正确打开方式 4对一次 redis 未授权写入攻击的分析以及 redis 4x RCE 学习 5reGeorg 工作流程分析(以 php 为例) 6浅析 Kerberos 认证过程以及黄金票据和白银票据 7JSONP 劫持原理与挖掘方法 8PHPINFO 中

PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)

CVE-2018-0802 CVE-2018-08022: portalmsrcmicrosoftcom/en-US/security-guidance/advisory/CVE-2018-0802 MITRE CVE-2018-0802: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2018-0802 0patch exploitation and patch video: wwwyoutubecom/watch?v=XU-U4K270Z4 Qihoo 360 blog post wwwfreebufcom/vuls/159789html Checkpoint blog (brute-force ASLR by

CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882

CVE-2017-11882 43b 原脚本来自于 githubcom/embedi/CVE-2017-11882 109b 原脚本来自于 githubcom/unamer/CVE-2017-11882/ (膜一波,现在unamer的代码已经可以执行shellcode了~) CVE-2017-11882: portalmsrcmicrosoftcom/en-US/security-guidance/advisory/ MITRE CVE-2017-11882: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2017-11

Crawler nguồn IOC (Indicators of Compromise)

Crawler nguồn IOC IOCs (hashes, địa chỉ IP, tên miền…) được lấy từ các nhóm nội bộ đến các tổ chức, hoặc có thể từ đơn vị cung cấp thứ ba Loại tìm kiếm này hầu như không chủ động nhưng lại mang về một số lợi ích trong quá trình t&i

This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.

CVE-2017-11882-metasploit This is a Metasploit module which exploits CVE-2017-11882 using the POC below: embedicom/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about Installation Copy the cve_2017_11882rb to /usr/share/metasploit-framework/modules/exploits/windows/local/ Copy the cve-2017-11882rtf to /usr/share/metasploit-framework/data/exploits/ Th

Empire Port of CVE-2017-11882

CVE-2017-11882 Empire Port of CVE-2017-11882 Code shifted to another parent repository Redirect?

CVE-2017-11882

ABC CVE-2017-11882 Invoke-Mimikatz googl/urb92R Calcexe googl/qTqqE4

CVE-2017-11882 exploitation

CVE-2017-11882 文章链接 隐藏17年的Office远程代码执行漏洞(CVE-2017-11882) wwwcnblogscom/Hi-blog/p/7878054html

漏洞分析

Vulnerability-analysis 漏洞分析 MSCOMCTLOCX RCE 漏洞 - CVE-2012-0158 CVE-2017-11882 文档型漏洞

some links gathering about penetration

Table of contents PentestInfo 0X01 Information Gethering IP And DNS Information leakage 0X02 Denial Of Service 0X03 Scan Identify Tools For Overall Scan Web Applications Scan Tools 0X04 Fuzz and Password 0X05 Password crack 0X06 System Vulnerability 0X07 Web Relevant Online Website 0X08 Existing Vulnerability Finding 0X09 Cheatsheet 0X10 Webshell And Payload 0X11 Code R

CVE-2017-11882 File Generator PoC

CVE-2017-11882 A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user 2017-11882_Generator This is a PoC re-edited, from the original one made by Embedi, to generate single file rt

PoC for CVE-2018-0802 And CVE-2017-11882

RTF_11882_0802 CVE-2017-11882 CVE-2017-11882: portalmsrcmicrosoftcom/en-US/security-guidance/advisory/CVE-2017-11882 MITRE CVE-2017-11882: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2017-11882 Research: embedicom/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about Patch analysis: 0patchblogspotru/2017/11/did-microsoft-just-man

威胁情报,恶意样本分析,开源Malware代码收集

Threat-Intelligence-Analyst 威胁情报,恶意样本分析,自动化python脚本,开源Malware代码收集,APT攻击安例相关 TI威胁情报 startme/p/rxRbpo/ti Analyzing Malicious Password Protected Office Documents r3mrumwordpresscom/2017/06/29/analyzing-malicious-password-protected-office-documents/ Hack githubcom/Hack-with-Github/Awesom

CVE-2017-11882 43b 原脚本来自于 githubcom/embedi/CVE-2017-11882 109b 原脚本来自于 githubcom/unamer/CVE-2017-11882/ (膜一波,现在unamer的代码已经可以执行shellcode了~) CVE-2017-11882: portalmsrcmicrosoftcom/en-US/security-guidance/advisory/ MITRE CVE-2017-11882: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2017-11

Extract OLEv1 objects from RTF files by instrumenting Word

Introduction rtfraptor is a simple tool to aid analysis of malicious RTF files by extracting OLEv1 objects It was inspired by a blog post by Denis O'Brien (link below) It works by running Word and intercepting calls to OLEv1 functions This allows raw OLE objects to be dumped from memory for further analysis The tool is designed to be run on Windows This is useful f

Crawler nguồn IOC (Indicators of Compromise)

Crawler nguồn IOC IOCs (hashes, địa chỉ IP, tên miền…) được lấy từ các nhóm nội bộ đến các tổ chức, hoặc có thể từ đơn vị cung cấp thứ ba Loại tìm kiếm này hầu như không chủ động nhưng lại mang về một số lợi ích trong quá trình t&i

RTF_11882_0802 CVE-2017-11882 CVE-2017-11882: portalmsrcmicrosoftcom/en-US/security-guidance/advisory/CVE-2017-11882 MITRE CVE-2017-11882: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2017-11882 Research: embedicom/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about Patch analysis: 0patchblogspotru/2017/11/did-microsoft-just-man

Research-Exploit-Office Reference wwwnccgrouptrust/uk/about-us/newsroom-and-events/blogs/2018/june/cve-2017-8570-rtf-and-the-sisfader-rat/ tradahackingvn/another-malicious-document-with-cve-2017-11882-839e9c0bbf2f successtrendmicrocom/solution/1123612-cve-2017-8570-vulnerability-downloads-high-profile-malware whitehatvn/threads/microsoft-ph

SophosLabs-Intelix In order to use the basic functionability of API SophosLabs Intelix , we have developped a tool that allows static or dynamical analysis of files In other words , the latter servers to examine and to identify malicious for Android Applications It consists of scanning hash or file giving a Json file that includes the analysis results Authors : -Script Au

Crawler nguồn IOC (Indicators of Compromise)

Crawler nguồn IOC IOCs (hashes, địa chỉ IP, tên miền…) được lấy từ các nhóm nội bộ đến các tổ chức, hoặc có thể từ đơn vị cung cấp thứ ba Loại tìm kiếm này hầu như không chủ động nhưng lại mang về một số lợi ích trong quá trình t&i

CVE-OTX Lookup About The Project Simple script to query AlienVault OTX for CVE information Specifically we're looking to learn if any given CVE has an existing exploit and if it has been exploited in the wild This is intended as a backup method of enriching vulnerability report data from TA Requirements CVE-OTX Lookup uses AlienVault's OTX Python SDK (distributed

RTF_11882_0802 CVE-2017-11882 CVE-2017-11882: portalmsrcmicrosoftcom/en-US/security-guidance/advisory/CVE-2017-11882 MITRE CVE-2017-11882: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2017-11882 Research: embedicom/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about Patch analysis: 0patchblogspotru/2017/11/did-microsoft-just-man

Microsoft Office Memory Corruption (CVE-2017-11882) Background Age: 17 year old vulnerability What is it: Run arbitrary code remotely without user interaction Why it works: Buffer overflow vulnerability inside equation editor (EQUEDT32exe) Who has been affected: Users who installed Microsoft Office 2007 Service Pack 3 Microsoft Office 2010 Service Pack 2 Microsoft Office 2

CVE-2017-11882 43b 原脚本来自于 githubcom/embedi/CVE-2017-11882 109b 原脚本来自于 githubcom/unamer/CVE-2017-11882/ (膜一波,现在unamer的代码已经可以执行shellcode了~) CVE-2017-11882: portalmsrcmicrosoftcom/en-US/security-guidance/advisory/ MITRE CVE-2017-11882: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2017-11

ShellCode Simplified: A Journey into Shellcode Analysis Recently, I solved a CTF challenge on CyberDefeners, and I can't wait to share my write-up with all of you 🚀✨ While I was solving the CTF I faced a ShellCode which is part of an exploit used to exploit a vulnerability CVE-2017-11882 💣 This vulnerability is found in many Microsoft office products in different

Malware-analysis-REMnux Overview This document provides a detailed walkthrough of the process for analyzing a real malware file using REMnux, a Linux distribution focused on assisting malware analysts with reverse-engineering tasks The document, a demonstration of MyDFIR, guides the reader through steps such as downloading the malware file, extracting its contents, examining

Malware-Analysis-w-REMnux Objective The objective of this lab was to analyze a malicious Microsoft Word document in order to extract relevant information such as the type of exploit it employs, the CVE code associated with the exploit, the name of the malicious software it downloads, the IP address and port it communicates with, and the name of the dropped executable file Skil

document-eqnobj-dataset This dataset is used to train CNN model to detect malicious document with formula editors exploits, such as CVE-2017-11882, CVE-2018-0802 and CVE-2018-0798 01-train_oleEqnB 4078 benign Equation Ole Objects comes from Internet and my lab 02-train_oleEqnM 1173 malicious Equation Ole Objects comes from 1798 malicious RTF files in Virustotal 03-test_oleEqn

CVE-2017-11882 43b 原脚本来自于 githubcom/embedi/CVE-2017-11882 109b 原脚本来自于 githubcom/unamer/CVE-2017-11882/ (膜一波,现在unamer的代码已经可以执行shellcode了~) CVE-2017-11882: portalmsrcmicrosoftcom/en-US/security-guidance/advisory/ MITRE CVE-2017-11882: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2017-11

   Malware Samples This repository is intended to provide access to a wide variety of malicious files and other artifacts All of the samples are in a password protected ZIP archive using a password of: infected Malware Analysis Exercises In addition to providing artifacts from samples, I will regularly post malware anlaysis exercises These exercises will c

The following was is the Phishing Prevention room in the Try Hack Me Soc 1 path.

Phishing-Prevention The following was is the Phishing Prevention room in the Try Hack Me Soc 1 path Phishing Case 1 Scenario: You are a Level 1 SOC Analyst Several suspicious emails have been forwarded to you from other coworkers You must obtain details from each email for your team to implement the appropriate rules to prevent colleagues from receiving additional spam/phish

CVE-2017-11882 43b 原脚本来自于 githubcom/embedi/CVE-2017-11882 109b 原脚本来自于 githubcom/unamer/CVE-2017-11882/ (膜一波,现在unamer的代码已经可以执行shellcode了~) CVE-2017-11882: portalmsrcmicrosoftcom/en-US/security-guidance/advisory/ MITRE CVE-2017-11882: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2017-11

Pada bulan maret 2023, terdapat sample baru yang terindentifikasi sebagai malware. Malware tersebut berasal dari file berekstensi.xls dan .doc dan dikenal dengan nama “Bank Slip.xls”. Aktivitas malware tersebut memiliki hubungan dengan kerentanan yang dikenal dengan id CVE-2017-11882 dan CVE-2018-0802.

Maldoc-Analysis Pada bulan maret 2023, terdapat sample baru yang terindentifikasi sebagai malware Malware tersebut berasal dari file berekstensixls dan doc dan dikenal dengan nama “Bank Slipxls” Aktivitas malware tersebut memiliki hubungan dengan kerentanan yang dikenal dengan id CVE-2017-11882 dan CVE-2018-0802

Config files for my GitHub profile.

👋 Hi, I’m @mohamed45237 👀 I’m interested in 🌱 I’m currently learning 💞️ I’m looking to collaborate on 📫 How to reach me 所有收集类项目 RAT 250+ 开源远控/C&C工具,1200+ RAT分析报告\C&C相关文章等。 English Version 目录 开源工具 pupy -> (1)工具 (6)文章 Covenant

Phishing Analysis Tools | TryHackMe | Solution

Phishing-Analysis-Tools- Phishing Analysis Tools | TryHackMe | Solution Phishing Analysis Tools Learn the tools used to aid an analyst to investigate suspicious emails Task1 11)Read the above Correct Answer: No answer needed — — — — — — — — — — — — — — — — — — —

CVE-2017-11882 43b 原脚本来自于 githubcom/embedi/CVE-2017-11882 109b 原脚本来自于 githubcom/unamer/CVE-2017-11882/ (膜一波,现在unamer的代码已经可以执行shellcode了~) CVE-2017-11882: portalmsrcmicrosoftcom/en-US/security-guidance/advisory/ MITRE CVE-2017-11882: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2017-11

AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports

Knowledge-enhanced-Attack-Graph Instructions Setup: python 38 pip install -r requirementstxt Running : # Generating attack graph for CTI report python mainpy -M attackGraphGeneration -R "/Dataset/Evaluation/Frankenstein Campaigntxt" -O /outputpdf # Identifing techniques in CTI report python mainpy -M techniqueIdentificat

CVE-2017-11882 Study Student Name: Peiran Sun, Yufeng Ge Date:2022220 Intro: Today we are going to talk about a vulnerability that affects everyone who uses Microsoft office for almost two decades When you opened a Microsoft Office file, have you ever noticed this annoying warning? I always wonder, how can a file display only text and pictures, maybe sometimes video, harmin

Análise de pacotes de tráfego de rede Esse documento tem como objetivo apresentar uma análise de pacotes de tráfego de rede, utilizando o software Wireshark para a matéria de segurança computacional 1 Introdução Esse relatório será organizado no seguinte formato: Introdução IPs e portas IPs

Lantern Shark is a static file analyzer written in HTML and Javascript.

Lantern Shark Lantern Shark is a file analyzer written in HTML and JavaScript It can extract metadata and embedded script code from multiple file types It also attempts to identify suspicious and malicious attributes of various file types A live demo of this project can be viewed here Additional Features Deobfuscation of extracted scripts via inserted comments Look for th

Malware-analysis-REMnux Overview This document provides a detailed walkthrough of the process for analyzing a real malware file using REMnux, a Linux distribution focused on assisting malware analysts with reverse-engineering tasks The document, a demonstration of MyDFIR, guides the reader through steps such as downloading the malware file, extracting its contents, examining

Recent Articles

New SteganoAmor attacks use steganography to target 320 orgs globally
BleepingComputer • Bill Toulas • 15 Apr 2024

New SteganoAmor attacks use steganography to target 320 orgs globally By Bill Toulas April 15, 2024 04:31 PM 0 A new campaign conducted by the TA558 hacking group is concealing malicious code inside images using steganography to deliver various malware tools onto targeted systems. Steganography is the technique of hiding data inside seemingly innocuous files to make them undetectable by users and security products. TA558 is a threat actor that has been active since 2018, known for targeting...

Spam and phishing in 2023
Securelist • Tatyana Kulikova • 07 Mar 2024

The year in figures 45.60% of all email sent worldwide and 46.59% of all email sent in the Runet (the Russian web segment) was spam 31.45% of all spam email was sent from Russia Kaspersky Mail Anti-Virus blocked 135,980,457 malicious email attachments Our Anti-Phishing system thwarted 709,590,011 attempts to follow phishing links SafeMessaging feature in Kaspersky mobile solutions prevented more than 62,000 redirects via phishing links from Telegram Phishing and scams in 2023 Hunting gamers In 2...

IT threat evolution Q3 2023
Securelist • David Emm • 01 Dec 2023

Targeted attacks Unknown threat actor targets power generator with DroxiDat and Cobalt Strike Earlier this year, we reported on a new variant of SystemBC called DroxiDat that was deployed against a critical infrastructure target in South Africa. This proxy-capable backdoor was deployed alongside Cobalt Strike beacons. The incident occurred in the third and fourth week of March, as part of a small wave of attacks involving both DroxiDat and Cobalt Strike beacons around the world; and we believe t...

IT threat evolution in Q3 2023. Non-mobile statistics
Securelist • AMR • 01 Dec 2023

These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q3 2023: Kaspersky solutions blocked 694,400,301 attacks from online resources across the globe. A total of 169,194,807 unique links were recognized as malicious by Web Anti-Virus components. Attempts to run malware for stealing money from online bank accounts were stopped on the com...

IT threat evolution in Q2 2023. Non-mobile statistics
Securelist • AMR • 30 Aug 2023

IT threat evolution in Q2 2023 IT threat evolution in Q2 2023. Non-mobile statistics IT threat evolution in Q2 2023. Mobile statistics These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q2 2023: Kaspersky solutions blocked 801,934,281 attacks from online resources across the globe. A total of 209,716,810 unique links were detected by Web ...

What’s happening in the world of crimeware: Emotet, DarkGate and LokiBot
Securelist • GReAT • 03 Aug 2023

Introduction The malware landscape keeps evolving. New families are born, while others disappear. Some families are short-lived, while others remain active for quite a long time. In order to follow this evolution, we rely both on samples that we detect and our monitoring efforts, which cover botnets and  underground forums. While doing so, we found new Emotet samples, a new loader dubbed “DarkGate”, and a new LokiBot infostealer campaign. We described all three in private reports, from ...

APT trends report Q2 2023
Securelist • GReAT • 27 Jul 2023

For more than six years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. These summaries are based on our threat intelligence research; and they provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They are designed to highlight the significant events and findings that we feel people should be aware of. This is our latest installment,...

IT threat evolution in Q1 2023. Non-mobile statistics
Securelist • AMR • 07 Jun 2023

IT threat evolution in Q1 2023 IT threat evolution in Q1 2023. Non-mobile statistics IT threat evolution in Q1 2023. Mobile statistics These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q1 2023: Kaspersky solutions blocked 865,071,227 attacks launched from online resources across the globe. Web Anti-Virus detected 246,912,694 unique URLs ...

Spam and phishing in 2022
Securelist • Tatyana Kulikova • 16 Feb 2023

Figures of the year In 2022: 48.63% of all emails around the world and 52.78% of all emails in the Russian segment of the internet were spam As much as 29.82% of all spam emails originated in Russia Kaspersky Mail Anti-Virus blocked 166,187,118 malicious email attachments Our Anti-Phishing system thwarted 507,851,735 attempts to follow phishing links 378,496 attempts to follow phishing links were associated with Telegram account hijacking Phishing in 2022 Last year’s resonant global events The...

IT threat evolution Q3 2022
Securelist • David Emm • 18 Nov 2022

IT threat evolution in Q3 2022 IT threat evolution in Q3 2022. Non-mobile statistics IT threat evolution in Q3 2022. Mobile statistics Targeted attacks CosmicStrand:  discovery of a sophisticated UEFI rootkit In July, we reported a rootkit that we found in modified Unified Extensible Firmware Interface (UEFI) firmware, the code that loads and initiates the boot process when the computer is turned on. Rootkits are malware implants that are installed deep in the operating syste...

IT threat evolution in Q3 2022. Non-mobile statistics
Securelist • AMR • 18 Nov 2022

IT threat evolution in Q3 2022 IT threat evolution in Q3 2022. Non-mobile statistics IT threat evolution in Q3 2022. Mobile statistics These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q3 2022: Kaspersky solutions blocked 956,074,958 attacks from online resources across the globe. Web Anti-Virus recognized 251,288,987...

IT threat evolution in Q2 2022. Non-mobile statistics
Securelist • AMR • 15 Aug 2022

IT threat evolution in Q2 2022 IT threat evolution in Q2 2022. Non-mobile statistics IT threat evolution in Q2 2022. Mobile statistics These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q2 2022: Kaspersky solutions blocked 1,164,544,060 attacks from online resources across the globe. Web Anti-Virus recognized 273,033,368 unique URLs as ma...

Targeted attack on industrial enterprises and public institutions
Securelist • Kaspersky ICS CERT • 08 Aug 2022

In January 2022, Kaspersky ICS CERT experts detected a wave of targeted attacks on military industrial complex enterprises and public institutions in several countries. In the course of our research, we were able to identify over a dozen of attacked organizations. The attack targeted industrial plants, design bureaus and research institutes, government agencies, ministries and departments in several East European countries (Belarus, Russia, and Ukraine), as well as Afghanistan. The attackers wer...

IT threat evolution in Q1 2022. Non-mobile statistics
Securelist • AMR • 27 May 2022

IT threat evolution in Q1 2022 IT threat evolution in Q1 2022. Non-mobile statistics IT threat evolution in Q1 2022. Mobile statistics These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q1 2022: Kaspersky solutions blocked 1,216,350,437 attacks from online resources across the globe. Web Anti-Virus recognized 313,164,030 unique URLs as ma...

APT trends report Q1 2022
Securelist • GReAT • 27 Apr 2022

For five years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. These summaries are based on our threat intelligence research; and they provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They are designed to highlight the significant events and findings that we feel people should be aware of. This is our latest installment, focusing...

Spam and phishing in 2021
Securelist • Tatyana Kulikova • 09 Feb 2022

Figures of the year In 2021: 56% of e-mails were spam 77% of spam was sent from Russia with another 14.12% from Germany Our Mail Anti-Virus blocked 148 173 261 malicious attachments sent in e-mails The most common malware family found in attachments were Agensla Trojans Our Anti-Phishing system blocked 253 365 212 phishing links Safe Messaging blocked 341 954 attempts to follow phishing links in messengers Trends of the year How to make an unprofitable investment with no...

Patch now? Why enterprise exploits are still partying like it's 1999
The Register • Davey Winder • 08 Sep 2021

Get our weekly newsletter Am I only dreaming, or is this burning an Eternal Blue?

Some vulnerabilities remain unreported for the longest time. The 12-year-old Dell SupportAssist remote code execution (RCE) flaw – which was finally unearthed earlier this year – would be one example. Others, however, have not only been long since reported and had patches released, but continue to pose a threat to enterprises. A joint advisory from the National Cyber Security Centre (NCSC) and the US Cybersecurity and Infrastructure Security Agency (CISA), published in late July, listed the ...

IT threat evolution Q3 2020. Non-mobile statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Oleg Kupreev Evgeny Lopatin Alexey Kulaev Alexander Kolesnikov • 20 Nov 2020

These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. According to Kaspersky Security Network, in Q3: In Q3 2020, Kaspersky solutions blocked attempts to launch one or more types of malware designed to steal money from bank accounts on the computers of 146,761 users. !function(e,i,n,s){var t="InfogramEmbeds",d=e.getElementsByTagName("script")[0];if(window[t]&&window[t].initialized)window[t].process&&w...

Spam and phishing in Q3 2020
Securelist • Tatyana Kulikova Tatyana Sidorina • 12 Nov 2020

These days, many companies distribute marketing newsletters via online platforms. In terms of capabilities, such platforms are quite diverse: they send out advertising and informational messages, harvest statistics (for example, about clicked links in emails), and the like. At the same time, such services attract both spammers, who use them to send their own mailings, and cybercriminals, who try to gain access to user accounts, usually through phishing. As a result, attackers also get their hand...

IT threat evolution Q2 2020. PC statistics
Securelist • Victor Chebyshev Evgeny Lopatin Fedor Sinitsyn Denis Parinov Oleg Kupreev Alexey Kulaev Alexander Kolesnikov • 03 Sep 2020

IT threat evolution Q2 2020. Review IT threat evolution Q2 2020. Mobile statistics These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. According to Kaspersky Security Network, in Q2: In Q2 2020, Kaspersky solutions blocked attempts to launch one or more types of malware designed to steal money from bank accounts on the computers of 181,725 users. !function(e,i,n,s){var t="InfogramEmbeds",d=e.getElementsByTagName("s...

Spam and phishing in Q2 2020
Securelist • Tatyana Kulikova Tatyana Sidorina Tatyana Shcherbakova • 07 Aug 2020

The second quarter often saw phishers resort to targeted attacks, especially against fairly small companies. To attract attention, scammers imitated email messages and websites of companies whose products or services their potential victims could be using. The scammers did not try to make any of the website elements appear credible as they created the fake. The login form is the only exception. One of the phishing websites we discovered even used a real captcha on that form. The main pretext tha...

Cycldek: Bridging the (air) gap
Securelist • GReAT Mark Lechtik Giampaolo Dedola • 03 Jun 2020

While investigating attacks related to a group named Cycldek post 2018, we were able to uncover various pieces of information on its activities that were not known thus far. In this blog post we aim to bridge the knowledge gap on this group and provide a more thorough insight into its latest activities and modus operandi. Here are some key insights that will be described in this publication: Cycldek is a long-known Chinese-speaking threat actor. Based on the group’s past activity, it has a str...

Spam and phishing in Q1 2020
Securelist • Tatyana Shcherbakova Tatyana Sidorina Tatyana Kulikova • 26 May 2020

Burning Man is one of the most eagerly awaited events among fans of spectacular performance and installation art. The main obstacle to attending is the price of admission: a standard ticket will set you back $475, the number is limited, and the buying process is a challenge all by itself (there are several stages, registration data must be entered at a specific time, and if something goes wrong you might not get a second chance). Therefore, half-price fake tickets make for excellent bait. Scamme...

IT threat evolution Q1 2020. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Oleg Kupreev Evgeny Lopatin Alexey Kulaev • 20 May 2020

These statistics are based on detection verdicts for Kaspersky products received from users who consented to providing statistical data. According to Kaspersky Security Network, Q1 2020 will be remembered primarily for the coronavirus pandemic and cybercriminals’ exploitation of the topic. In particular, the creators of a new modification of the Ginp banking trojan renamed their malware Coronavirus Finder and then began offering it for €0.75 disguised as an app supposedly capable of detectin...

US-CERT lists the 10 most-exploited security bugs and, yeah, it's mostly Microsoft holes people forgot to patch
The Register • Shaun Nichols in San Francisco • 14 May 2020

Update, update, update. Plus: Flash, Struts, Drupal also make appearances Sadly, 111 in this story isn't binary. It's decimal. It's the number of security fixes emitted by Microsoft this week

Vulnerabilities in Microsoft Windows, Office, and Windows Server, for which patches have been available for years, continue to be the favorite target for hackers looking to spread malware. A list posted by US-CERT this week rattles off the 10 most oft-targeted security vulnerabilities during the past three years, and finds that, shock horror, for the most part, keeping up with patching will keep you safe. Microsoft ranks highly in the list because its software is widely used, and provides the mo...

Spam and phishing in 2019
Securelist • Maria Vergelis Tatyana Shcherbakova Tatyana Sidorina Tatyana Kulikova • 08 Apr 2020

In 2019, attackers were more active than usual in their exploitation of major sports and movie events to gain access to users’ financial or personal data. Premieres of TV shows and films, and sports broadcasts were used as bait for those looking to save money by watching on “unofficial” resources. A search for “Watch latest X for free” (where X = Avengers movie, Game of Thrones season, Stanley Cup game, US Open, etc.) returned links to sites offering the opportunity to do precisely tha...

IT threat evolution Q3 2019. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Boris Larin Oleg Kupreev Evgeny Lopatin • 29 Nov 2019

These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. According to Kaspersky Security Network: In Q3 2019, we discovered an extremely unpleasant incident with the popular CamScanner app on Google Play. The new version of the app contained an ad library inside with the Trojan dropper Necro built in. Judging by the reviews on Google Play, the dropper’s task was to activate paid subscriptions, although it could delive...

IT threat evolution Q3 2019
Securelist • David Emm • 29 Nov 2019

At the end of June we reported the details of a highly targeted campaign that we dubbed ‘Operation ViceLeaker’ involving the spread of malicious Android samples via instant messaging. The campaign affected several dozen victims in Israel and Iran. We discovered this activity in May 2018, right after Israeli security agencies announced that Hamas had installed spyware on the smartphones of Israeli soldiers, and we released a private report on our Threat Intelligence Portal. We believe the mal...

Spam and phishing in Q3 2019
Securelist • Maria Vergelis Tatyana Sidorina Tatyana Shcherbakova • 26 Nov 2019

In Q3, we registered numerous scam mailings related to Amazon Prime. Most of the phishing emails with a link to a fake Amazon login page offered new prices or rewards for buying things, or reported problems with membership, etc. Against the backdrop of September’s Prime Day sale, such messages were plausible. Scammers also used another fraudulent scheme: An email informed victims that their request to cancel Amazon Prime had been accepted, but if they had changed their mind, they should call t...

Spam and phishing in Q2 2019
Securelist • Maria Vergelis Tatyana Shcherbakova Tatyana Sidorina • 28 Aug 2019

In the second quarter of 2019, scammers were making active use of cloud-based data storage services such as Google Drive and Google Storage to hide their illegal content. The reasoning behind this is simple: a link from a legitimate domain is seen as more trustworthy by both users and spam filters. Most often, such links point to text files, tables, presentations, and other documents containing text and a link, say, to an advertised product or phishing page. Also this past quarter, cybercriminal...

IT threat evolution Q2 2019. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Boris Larin Oleg Kupreev Evgeny Lopatin • 19 Aug 2019

These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. According to Kaspersky Security Network, Q2 2019 will be remembered for several events. First, we uncovered a large-scale financial threat by the name of Riltok, which targeted clients of not only major Russian banks, but some foreign ones too. Second, we detected the new Trojan.AndroidOS.MobOk malware, tasked with stealing money from mobile accounts through explo...

Recent Cloud Atlas activity
Securelist • GReAT • 12 Aug 2019

Also known as Inception, Cloud Atlas is an actor that has a long history of cyber-espionage operations targeting industries and governmental entities. We first reported Cloud Atlas in 2014 and we’ve been following its activities ever since. From the beginning of 2019 until July, we have been able to identify different spear-phishing campaigns related to this threat actor mostly focused on Russia, Central Asia and independent regions of Ukraine. Cloud Atlas hasn’t changed its TTPs (Tactic Too...

IT threat evolution Q1 2019. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Boris Larin Oleg Kupreev Evgeny Lopatin • 23 May 2019

These statistics are based on detection verdicts of Kaspersky Lab products received from users who consented to provide statistical data. According to Kaspersky Security Network, Q1 2019 is remembered mainly for mobile financial threats. First, the operators of the Russia-targeting Asacub Trojan made several large-scale distribution attempts, reaching up to 13,000 unique users per day. The attacks used active bots to send malicious links to contacts in already infected smartphones. The mailings ...

Spam and phishing in Q1 2019
Securelist • Maria Vergelis Tatyana Shcherbakova Tatyana Sidorina • 15 May 2019

As per tradition, phishing timed to coincide with lovey-dovey day was aimed at swindling valuable confidential information out of starry-eyed users, such as bank card details. The topics exploited by cybercriminals ranged from online flower shops to dating sites. But most often, users were invited to order gifts for loved ones and buy medications such as Viagra. Clicking/tapping the link in such messages resulted in the victim’s payment details being sent to the cybercriminals. Late March saw ...

FIN7.5: the infamous cybercrime rig “FIN7” continues its activities
Securelist • Yury Namestnikov Félix Aime • 08 May 2019

On August 1, 2018, the US Department of Justice announced that it had arrested several individuals suspected of having ties to the FIN7 cybercrime rig. FIN7 operations are linked to numerous intrusion attempts having targeted hundreds of companies since at least as early as 2015. Interestingly, this threat actor created fake companies in order to hire remote pentesters, developers and interpreters to participate in their malicious business. The main goal behind its malicious activities was to st...

Kaspersky updates its cybercrook look book: Smashing Office is hot, browser vulns are not
The Register • Gareth Corfield • 16 Apr 2019

Over two-thirds of attacks Russian biz spied targeted venerable Microsoft suite If at first you, er, make things worse, you're probably Microsoft: Bug patch needed patching

Russian security biz Kaspersky Lab has said more than 70 per cent of malware attacks it detected last year were made against everyone's favourite Microsoft suite – Office. "In the past few months, MS Office... became the most targeted platform," the firm said in a blog post. It produced a graph showing that between Q4 2016 and Q4 2018, Office-targeting attacks rose from 16 per cent of total Kaspersky detections to more than two-thirds. The outfit also reported a switch away from ne'er-do-wells...

Spam and phishing in 2018
Securelist • Maria Vergelis Tatyana Shcherbakova Tatyana Sidorina • 12 Mar 2019

In the first months of the year alone, we registered a great many emails in spam traffic connected in some way to the EU General Data Protection Regulation (GDPR). It was generally B2B spam — mostly invitations to paid seminars, webinars, and workshops promising to explain the ins and outs of the new regulation and its ramifications for business. During this period, there was an upturn in legitimate mailings too. Following the requirements of the regulation, companies sent out notifications on...

GreyEnergy’s overlap with Zebrocy
Securelist • Kaspersky Lab ICS CERT • 24 Jan 2019

In October 2018, ESET published a report describing a set of activity they called GreyEnergy, which is believed to be a successor to BlackEnergy group. BlackEnergy (a.k.a. Sandworm) is best known, among other things, for having been involved in attacks against Ukrainian energy facilities in 2015, which led to power outages. Like its predecessor, GreyEnergy malware has been detected attacking industrial and ICS targets, mainly in Ukraine. Kaspersky Lab ICS CERT has identified an overlap between G...

IT threat evolution Q3 2018. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Oleg Kupreev Evgeny Lopatin Alexander Liskin • 12 Nov 2018

These statistics are based on detection verdicts of Kaspersky Lab products received from users who consented to provide statistical data. According to Kaspersky Security Network: Perhaps the biggest news of the reporting period was the Trojan-Banker.AndroidOS.Asacub epidemic. It peaked in September when more than 250,000 unique users were attacked – and that only includes statistics for those with Kaspersky Lab’s mobile products installed on their devices. Number of users attacked by the mob...

Spam and phishing in Q3 2018
Securelist • Maria Vergelis Nadezhda Demidova Tatyana Shcherbakova • 06 Nov 2018

We have often said that personal data is candy on a stick to fraudsters and must be kept safe (that is, not given out on dubious websites). It can be used to gain access to accounts and in targeted attacks and ransomware campaigns. In Q3, we registered a surge of fraudulent emails in spam traffic. This type of scam we have already reported at the beginning of the year. A ransom (in bitcoins) is demanded  in exchange for not disclosing the “damaging evidence” concerning the recipients. The n...

Spam and phishing in Q2 2018
Securelist • Maria Vergelis Nadezhda Demidova Tatyana Shcherbakova • 14 Aug 2018

In the first quarter, we discussed spam designed to exploit GDPR (General Data Protection Regulation), which came into effect on May 25, 2018. Back then spam traffic was limited to invitations to participate in workshops and other educational events and purchase software or databases. We predicted that fraudulent emails were soon to follow. And we found them in the second quarter. As required by the regulation, companies notified email recipients that they were switching to a new GDPR-compliant ...

IT threat evolution Q2 2018. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Alexander Liskin Oleg Kupreev • 06 Aug 2018

According to KSN: In Q2 2018, Kaspersky Lab detected 1,744,244 malicious installation packages, which is 421,666 packages more than in the previous quarter. Among all the threats detected in Q2 2018, the lion’s share belonged to potentially unwanted RiskTool apps (55.3%); compared to the previous quarter, their share rose by 6 p.p. Members of the RiskTool.AndroidOS.SMSreg family contributed most to this indicator. Second place was taken by Trojan-Dropper threats (13%), whose share fell by 7 p....

FBI boss: We went to the Moon, so why can't we have crypto backdoors? – and more this week
The Register • Iain Thomson in San Francisco • 28 Jul 2018

The good, the bad, and the ugly from infosec

Roundup There has been a bumper crop of security news this week, including another shipping giant getting taken down by ransomware, Russian hackers apparently completely pwning US power grids and a sane request from Senator Wyden (D-OR) for the US government to dump Flash. But there has been other news bubbling under. Useless action please! While Wyden might know what he's talking about his colleagues seem set on useless posturing. On Tuesday Senators Pat Toomey (R-PA) and Chris Van Hollen (D-MD...

LuckyMouse hits national data center to organize country-level waterholing campaign
Securelist • Denis Legezo • 13 Jun 2018

In March 2018 we detected an ongoing campaign targeting a national data center in the Central Asia that we believe has been active since autumn 2017. The choice of target made this campaign especially significant – it meant the attackers gained access to a wide range of government resources at one fell swoop. We believe this access was abused, for example, by inserting malicious scripts in the country’s official websites in order to conduct watering hole attacks. The operators used the Hyper...

IT threat evolution Q1 2018. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Alexander Liskin Oleg Kupreev • 14 May 2018

According to KSN: In Q1 2018, DNS-hijacking, a new in-the-wild method for spreading mobile malware on Android devices, was identified. As a result of hacked routers and modified DNS settings, users were redirected to IP addresses belonging to the cybercriminals, where they were prompted to download malware disguised, for example, as browser updates. That is how the Korean banking Trojan Wroba was distributed. It wasn’t a drive-by-download case, since the success of the attack largely depended ...

APT Trends report Q1 2018
Securelist • GReAT • 12 Apr 2018

In the second quarter of 2017, Kaspersky’s Global Research and Analysis Team (GReAT) began publishing summaries of the quarter’s private threat intelligence reports in an effort to make the public aware of the research we have been conducting. This report serves as the next installment, focusing on the relevant activities that we observed during Q1 2018. These summaries serve as a representative snapshot of what has been discussed in greater detail in our private reports, in order to highlig...

It's 2017 – and your Windows PC can be forced to run malware-stuffed Excel macros
The Register • Shaun Nichols in San Francisco • 15 Nov 2017

Not enough? How about a few dozen PDF remote code holes?

Microsoft and Adobe are getting into the holiday spirit this month by gorging users and admins with a glut of security fixes. The November of Patch Tuesday brings fixes for more than 130 bugs between the two software giants for products including IE, Edge, Office, Flash Player and Acrobat. Microsoft's patch dump addresses a total 53 CVE-listed vulnerabilities, including three that already have been publicly detailed. Those include CVE-2017-11827, a memory corruption flaw in Edge and IE that lets...

You patched yet? Years-old Microsoft security holes still hot targets for cyber-crooks
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources We're number one! We're number one! We're...

It's generally accepted that security flaws in Microsoft's products are a top magnet for crooks and fraudsters: its sprawling empire of hardware and software is a target-rich ecosystem in that there is a wide range of bugs to exploit, and a huge number of vulnerable organizations and users. And so we can believe it when Qualys yesterday said 15 of the 20 most-exploited software vulnerabilities it has observed are in Microsoft's code. These are the vulnerabilities abused by miscreants to infect v...

China-linked spies used six backdoors to steal info from defense, industrial enterprise orgs
The Register • Jessica Lyons Hardcastle • 01 Jan 1970

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources We're 'highly likely' to see similar attacks, Kaspersky warned Security Poll

Beijing-backed cyberspies used specially crafted phishing emails and six different backdoors to break into and then steal confidential data from military and industrial groups, government agencies and other public institutions, according to Kaspersky researchers. We're told the security shop's industrial control systems (ICS) response team initially detected a series of targeted attacks back in January that compromised more than a dozen of organizations in several Eastern European countries, inc...

It's 2022 and there are still malware-laden PDFs in emails exploiting bugs from 2017
The Register • Jeff Burt • 01 Jan 1970

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Crafty file names, encrypted malicious code, Office flaws – ah, it's like the Before Times

HP's cybersecurity folks have uncovered an email campaign that ticks all the boxes: messages with a PDF attached that embeds a Word document that upon opening infects the victim's Windows PC with malware by exploiting a four-year-old code-execution vulnerability in Microsoft Office. Booby-trapping a PDF with a malicious Word document goes against the norm of the past 10 years, according to the HP Wolf Security researchers. For a decade, miscreants have preferred Office file formats, such as Word...