Hacker exploited three vulnerabilities in Microsoft Office to spread Zyklon malware
Security researchers have discovered a botnet spread of malware through at least three new vulnerabilities published in Microsoft Office. Named Zyklon, this malware is exposed after almost 2 years and is primarily targeted at finance, insurance and telecommunications companies.
What is a botnet, who does it use to attack, and how can you prevent botnet?
Starting operations in 2016, Zyklon is the HTTP botnet malware that communicates with the C&C server through the Tor anonymous network and allows an attacker to steal keylogs, sensitive information such as browser passwords or emails. It can also install plugins, silently use a poisoning machine for DDoS attacks or dig virtual money.
Zyklon versions are advertised in the underground market for $ 75 (regular edition) and $ 125 (Tor version). According to a recent study by FireEye, the attacker after the campaign uses three Microsoft Office vulnerabilities to execute the PowerShell script and download the payload from the C&C server to the victim's computer.
- .NET Framework RCE Vulnerability (CVE-2017-8759) : the vulnerability executes remote code when Microsoft .NET Framework handles unreliable inputs. Attackers trick victims into opening files with malicious code via email and take control of the system. Microsoft has released this patch from the September update.
- Microsoft Office REC Vulnerability (CVE-2017-11882) : memory interruption existed 17 years ago and was patched by Microsoft in November update. This vulnerability allows victims to execute malicious code on victim machines No need to open infected files.
- Dynamic Data Exchange Protocol (DDE Exploit) : an attacker uses built-in features on Microsoft Office called DDE to execute code on a victim's computer without turning on Macrio or interrupting memory.
Three vulnerabilities in MIcrosoft Office have been exploited to spread malware
Currently, these three vulnerabilities have been exploited to spread Zyklon malware via phishing emails, often in ZIP form and containing contaminated Office files.
When opened, this infected file runs a PowerShell script that will load the payload (Zyklon HTTP) on the victim's computer.'These techniques share the domain to load the payload at the next level (Pause.ps1), which is another PowerShell script encoded with Base64' , FireEye researchers said. 'Pause.ps1 handles the API needed to inject code. It also contains shellcode that can be injected. The injected code will load the payload from the server. The final payload is the PE executable file that is compiled with the .NET Framework '.
Interestingly, the PowerShell script connects all IP addresses without dots (Dotless IP Address - eg http: 3627732942) to download the last payload.
* Dotless IP Address is sometimes called Decimal Address which is the decimal value of IPv4 address (indicated by dots between the numbers). Most browsers currently convert Decimal Address addresses to equivalent IPv4 addresses when opening with 'http:///'.
For example, Google's IP address 216.58.207.206 converted to decimal value will be http:/// 3627732942.
See more:
- The unpatched Microsoft Word DDE vulnerability is exploited in a massive malware attack
- 3 golden rules to avoid fake attacks
- How to open the infected PowerPoint file, causing hackers to invade the computer?
According to BP
You should read it
- The unpatched Microsoft Word DDE vulnerability is exploited in a massive malware attack
- Hackers are using new Microsoft Office vulnerabilities to distribute malware
- Microsoft has just taken down a huge botnet network
- Critical error on Skype allows hackers to execute malicious code remotely
- The same Skype ID malware author used to run IoT Botnet and apply for jobs
- Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
- Microsoft releases important OOB security updates for Microsoft Office
- Signs that your computer is infected with malware
- Microsoft: 100% of PCs in Vietnam are infected with malware
- Detects 'long-standing' security vulnerabilities in Microsoft Office
- Check fake emails, check if an email address exists or not
- The US warned about DealtaCharlie - DDoS botnet malware from Korea
May be interested
Discover a software stealing Facebook account on the phone developed by Vietnamese hackers
Discovered a group of hackers who use secret code to spy on 21 countries
A malicious extension 'occupies' Chrome and Firefox browsers appears, preventing users from uninstalling
DNS error allows to hack millions of PCs on all Blizzard games
Now even YouTube ads use CPU viewers to dig virtual money
Campaign to distribute spyware aimed at macOS in Vietnam