• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Microsoft Office

Hide and Script: Inserted Malicious URLs within Office Documents’ Embedded Videos

  • Posted on:November 12, 2018 at 5:02 am
  • Posted in:Malware
  • Author:
    Trend Micro
0

In late October, security researchers from Cymulate showed a proof of concept (PoC) exploiting a logic bug that could allow hackers to abuse the online video feature in Microsoft Office to deliver malware. We indeed identified an in-the-wild sample (detected by Trend Micro as TROJ_EXPLOIT.AOOCAI) in VirusTotal, using this method to deliver the URSNIF information stealer (TSPY_URSNIF.OIBEAO).

Since this kind of attack involves the use of a specially crafted Word document, we can assume that it can arrive on a user’s system through other malware or as an attachment or links/URLs in spam.

Read More
Tags: Microsoft Officeproof-of-conceptURSNIFvideo

Macro-based Malware Increases Along with Spam Volume, Now Drops BARTALEX

  • Posted on:March 24, 2015 at 4:44 pm
  • Posted in:Malware, Spam
  • Author:
    Maydalene Salvador (Anti-spam Research Engineer)
1

Early this year Microsoft reported an increase in macro-related threats being used to spread malware via spam. Similarly, we’ve been seeing a drastic increase in spammed emails with attached Microsoft Word documents and Microsoft Excel spreadsheets that come with embedded macros. Macros are a set of commands or code that are meant to help automate…

Read More
Tags: bartalexmacro malwareMicrosoft OfficeSpam

Beware the “Insert and Link” Feature in Microsoft Office

  • Posted on:March 18, 2015 at 10:07 am
  • Posted in:Malware, Targeted Attacks
  • Author:
    Abraham Camba (Threat Researcher)
2

Throughout course of my monitoring future and possible targeted attacks, I recently chanced upon a spear-phishing email sent to an undisclosed recipient that contains three seemingly harmless documents. I was curious about the attached documents so I first checked the one titled AlSajana Youth Center financial Report.docx. The so-called financial report turned out to be…

Read More
Tags: Microsoft OfficeMicrosoft Word

Microsoft Windows Hit By New Zero-Day Attack

  • Posted on:October 21, 2014 at 10:14 pm
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Jonathan Leopando (Technical Communications)
0

Microsoft has disclosed that a new zero-day vulnerability is present in Windows, and is exploited via Microsoft Office files. According to Microsoft Security Advistory 3010060, the vulnerability is present in all supported versions of Windows except Windows Server 2003. The vulnerability (designated as CVE-2014-6352) is triggered by an attacker sending a specially crafted Microsoft Office file…

Read More
Tags: Microsoft Officemicrosoft windowsOLEzero-day vulnerability

June 2014 Patch Tuesday Resolves Critical Flaws in Internet Explorer, Microsoft Office

  • Posted on:June 10, 2014 at 6:32 pm
  • Posted in:Vulnerabilities
  • Author:
    Bernadette Irinco (Technical Communications)
0

Two out of seven bulletins in today’s Microsoft Patch Tuesday are tagged as critical while the rest are marked as important. The critical bulletins addressed a number of vulnerabilities found existing in Microsoft Office and Internet Explorer, which when exploited could allow remote code execution, thus compromising the security of the systems. Perhaps the most…

Read More
Tags: Internet ExplorerMicrosoftMicrosoft OfficePatch TuesdayWindows
Page 1 of 212

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.