Hacker exploited three vulnerabilities in Microsoft Office to spread Zyklon malware
Security researchers have discovered a botnet spread of malware through at least three new vulnerabilities published in Microsoft Office.
Security researchers have discovered a botnet spread of malware through at least three new vulnerabilities published in Microsoft Office. Named Zyklon, this malware is exposed after almost 2 years and is primarily targeted at finance, insurance and telecommunications companies.
What is a botnet, who does it use to attack, and how can you prevent botnet?
Starting operations in 2016, Zyklon is the HTTP botnet malware that communicates with the C&C server through the Tor anonymous network and allows an attacker to steal keylogs, sensitive information such as browser passwords or emails. It can also install plugins, silently use a poisoning machine for DDoS attacks or dig virtual money.
Zyklon versions are advertised in the underground market for $ 75 (regular edition) and $ 125 (Tor version). According to a recent study by FireEye, the attacker after the campaign uses three Microsoft Office vulnerabilities to execute the PowerShell script and download the payload from the C&C server to the victim's computer.
- .NET Framework RCE Vulnerability (CVE-2017-8759) : the vulnerability executes remote code when Microsoft .NET Framework handles unreliable inputs. Attackers trick victims into opening files with malicious code via email and take control of the system. Microsoft has released this patch from the September update.
- Microsoft Office REC Vulnerability (CVE-2017-11882) : memory interruption existed 17 years ago and was patched by Microsoft in November update. This vulnerability allows victims to execute malicious code on victim machines No need to open infected files.
- Dynamic Data Exchange Protocol (DDE Exploit) : an attacker uses built-in features on Microsoft Office called DDE to execute code on a victim's computer without turning on Macrio or interrupting memory.
Three vulnerabilities in MIcrosoft Office have been exploited to spread malware
Currently, these three vulnerabilities have been exploited to spread Zyklon malware via phishing emails, often in ZIP form and containing contaminated Office files.
When opened, this infected file runs a PowerShell script that will load the payload (Zyklon HTTP) on the victim's computer.'These techniques share the domain to load the payload at the next level (Pause.ps1), which is another PowerShell script encoded with Base64' , FireEye researchers said. 'Pause.ps1 handles the API needed to inject code. It also contains shellcode that can be injected. The injected code will load the payload from the server. The final payload is the PE executable file that is compiled with the .NET Framework '.
Interestingly, the PowerShell script connects all IP addresses without dots (Dotless IP Address - eg http: 3627732942) to download the last payload.
* Dotless IP Address is sometimes called Decimal Address which is the decimal value of IPv4 address (indicated by dots between the numbers). Most browsers currently convert Decimal Address addresses to equivalent IPv4 addresses when opening with 'http:///'.
For example, Google's IP address 216.58.207.206 converted to decimal value will be http:/// 3627732942.
See more:
- The unpatched Microsoft Word DDE vulnerability is exploited in a massive malware attack
- 3 golden rules to avoid fake attacks
- How to open the infected PowerPoint file, causing hackers to invade the computer?
According to BP
You should read it
- The unpatched Microsoft Word DDE vulnerability is exploited in a massive malware attack
- Hackers are using new Microsoft Office vulnerabilities to distribute malware
- Microsoft has just taken down a huge botnet network
- Critical error on Skype allows hackers to execute malicious code remotely
- The same Skype ID malware author used to run IoT Botnet and apply for jobs
- Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
- Microsoft releases important OOB security updates for Microsoft Office
- Signs that your computer is infected with malware
- Microsoft: 100% of PCs in Vietnam are infected with malware
- Detects 'long-standing' security vulnerabilities in Microsoft Office
- Check fake emails, check if an email address exists or not
- The US warned about DealtaCharlie - DDoS botnet malware from Korea
Maybe you are interested
What is WannaCry, how to prevent Wanna cry for computers How to insert Textbox in Excel Dell Latitude 9510 officially launched: 5G support, up to 30 hours of battery life What is air purifier? What is the structure and mechanism of operation? Shade ransomware, the nightmare of 5 years ago is showing signs of returning 5 note to not be blocked Facebook account