Features available on MS Office allow malware to enter without turning on the macro
Since cybercriminals appear more and more, traditional techniques become more mysterious when exploiting standard tools and protocols that are often overlooked.
Researchers at Cisco's Talos team have discovered an attack campaign that spreads Microsoft Word files with malware, executing code on a compromised machine without turning on Macros or affecting memory.
The Macro-less MSWord code execution technique is described by two researchers from Sensepost, Etienne Stalmans and Saif El-Sherei, using built-in MS Office features called Dynamic Data Exchange (DDE) to enforcement.
The file uses the DDE protocol, which is used to share data
The DDE protocol is one of the Microsoft methods that allows two applications to share the same data. Applications use this protocol to transfer data once and continue to exchange, whereby the application sends updates to each other when new data is available.
Thousands of applications are using the DDE protocol, including Excel, MS Word, Quattro Pro and Visual Basic .
The mining technique described by the researchers does not show warnings to victims, except to ask if they want to execute the application in the command. However, this warning may also be 'modified syntax'.
MS Word DDE has been exploited in practice
According to Cisco's description, this technique has been exploited by hackers, targeting a number of organizations by using fake email of SEC (Securities Trading Commission).
'Emails containing malicious files [MS Word] can open up a complicated process of poisoning, leading to DNSMessenger malware infection,' Talos researchers said.
In early March, researchers at Talos discovered that DNSMessenger, a remote-access remote user, used a DNS query to execute a poisoned PowerShell command on the victim's machine.
Alerts direct users to another link
When opened, the victim receives a message that the file contains a link to the external file and asks for permission to deny or deny the content.
If allowed, the infected file will communicate with the content of the host attacker to retrieve the code and then execute this code to start the DNS malware infection.
'Interesting is that the DDEAUTO that this file uses to get the code is hosted on a Louisiana state website, may have been attacked and used for this purpose'.
How to detect MS Word DDE attack?
More worrisome is that MIcrosoft does not consider this a security issue, but according to them, the DDE protocol is a feature that cannot be deleted but can be improved to warn better in the future.
Although there is no direct way to disable the execution of DDE code, users can actively check the event history to see if it is exploited.
Instructions from NVISO to detect if the device has been attacked by malware
In addition, researchers at NVISO Labs also introduced 2 rules to detect DDE in Office Open XML file.https://blog.nviso.be/2017/10/11/detecting-dde-in-ms-office-documents/
You should read it
- ProFTPD remote code execution vulnerability affects more than 1 million servers worldwide
- Detects code execution vulnerabilities in WinRAR, noting more than 100 infringement cases
- Hacker exploited three vulnerabilities in Microsoft Office to spread Zyklon malware
- Adobe Flash Player has a serious zero-day vulnerability
- JavaScript code to generate dynamic line graphs/charts
- Set up remote access with dynamic IP address
- Hundreds of HP printer models contain vulnerabilities that allow remote code execution attacks
- Critical error on Apache Struts2 allows hackers to take over the web server
May be interested
- How to troubleshoot macros in Excel not workingexcel macros are a powerful feature designed to automate repetitive tasks, saving you both time and effort. however, it is not uncommon to experience problems while macros are enabled, which can be extremely annoying, preventing you from streamlining your workflow.
- Hackers are using new Microsoft Office vulnerabilities to distribute malwarehackers are exploiting vulnerabilities in microsoft office software to spread a kind of sophisticated malware capable of stealing certificates, exploiting cryptocurrency and conducting denial of service (ddos) attacks.
- Latest features of Microsoft Office 2019microsoft has been quite tight-lipped about office 2019, but the features deployed for office 365 provide some useful 'clues'. discover the latest additional features for office 2019 through the following article!
- Microsoft Office for iPad has additional printing featuresalthough the office suite for ipad has brought resounding success to microsoft as soon as it was launched, there are also many users complaining about the inconvenience when unable to perform the print function.
- Hacker exploited three vulnerabilities in Microsoft Office to spread Zyklon malwaresecurity researchers have discovered a botnet spread of malware through at least three new vulnerabilities published in microsoft office.
- errno.h in Cthe file header named errno.h in standard c library defines the integer variable errno, which is set by system call and some library functions for errors to indicate that an error is occurring. this macro is an extension of the type of lvalue type int which can be modified, so it can be read and modified by a program.
- How to Remove a Macro in Excelthis wikihow teaches you how to remove a macro from a microsoft excel spreadsheet. you can do this from within the spreadsheet's settings in excel on both windows and mac computers. open the macro-enabled excel sheet. double-click the...
- How to Create an OpenOffice Macroan openoffice macro can be created to combine a series of frequently repeated tasks into a single step. macros can be effective in saving time, increasing efficiency, and improving productivity in situations where there is a significant...
- Microsoft has just 'lowered' the way hackers use to control computersupdating in the office 2016 suite gives enterprise administrators the right to block the process of running macros in files.
- Link Download Microsoft Office 2019microsoft office is a family of software and client & server services developed by microsoft. originally the term for office suites - microsoft's bundled productivity suite. the first version of microsoft office contained microsoft word, microsoft excel and microsoft powerpoint.