Remcos Alert: Ingenious Excel Phishing Campaign Spreading Dangerous Fileless Malware
Excel users need to be on guard as a newly discovered phishing campaign is targeting Microsoft's spreadsheet application.
This campaign distributes a new fileless malware version of a dangerous remote access Trojan that is being distributed through a Microsoft 365 (formerly Microsoft Office) vulnerability - and is now being actively exploited.
Hackers are targeting Excel to spread dangerous malware
Always on the front lines, Fortinent's Fortiguard Labs has uncovered a phishing campaign targeting Excel users.
The attack uses a phishing email lure disguised as a shipping order with a malicious Microsoft Excel spreadsheet attached. Once downloaded and opened, the spreadsheet exploits a remote code execution vulnerability (CVE-2017-0199) to download the HTML application.
Once downloaded, the HTML application executes and attempts to download another file – the actual Remcos malware. Remcos is a well-known remote access Trojan that can give attackers a direct line into an infected computer. It is one of many dangerous malware types that can be purchased in neat packages on underground hacker forums.
This time, however, researcher Xiaopeng Zhang found a fileless variant of the Remcos RAT that works with the infected system's memory, allowing it to evade detection by anti-malware tools. It also adds a specific autorun system registry to "maintain persistence and control over the victim's device across reboots"—another example of persistent malware.
Remcos RAT operators can use keyloggers and screen recorders to collect private information, audio, and other data. The stolen data is then encrypted and sent back to the operator, where it can be exploited.
Keep Microsoft 365 and your computer up to date to stay safe!
Unfortunately, the research does not indicate specific versions of Microsoft Excel affected by this vulnerability. Although the CVE-2017-0199 note does list older versions of Excel and Office under 'Known Affected Software Configurations,' that section has not been updated since the phishing campaign was discovered.
So when in doubt, keep Microsoft 365 and your operating system up to date. If possible, upgrade to the latest version of Microsoft 365 for maximum security.
You should read it
- Fileless malware - Achilles heel of traditional antivirus software
- What is Safe Malware? Why is it so dangerous?
- 10 typical malware types
- Warning: The malware campaign hides the shadow of gift emails from Amazon
- The Purple Fox malware targets vulnerable Windows systems worldwide
- The malware detection is extremely dangerous, unable to destroy even if the operating system is reinstalled and the hard drive is replaced
- The 4 most common ways to spread malware today
- Android malware believed to be spreading from Vietnam has attacked more than 10,000 Facebook accounts in 140 countries
May be interested
- More than 200 apps containing malicious code were discovered and downloaded millions of times on the Google Play Store.a cybersecurity firm has discovered a huge number of android apps containing malicious code (adware), a discovery that also raises big questions about how google monitors its online store.
- Famous cyber attacks of the past decadethere are two basic types of ransomware, but hackers also have many other ways to attack an information technology system.
- Is it possible to 'crack' ransomware?security experts can use decryption tools to unlock data infected with ransomware, but in reality it's not that simple.
- Detection of Windows SmartScreen vulnerability being exploited to spread DarkGate malwarea new wave of active darkgate malware exploits a vulnerability in the now upgraded windows defender smartscreen.
- Serious vulnerability helps hackers attack Facebook accounts without the victim's actionscyber security expert samip aryal has just published information about a security vulnerability on this social network, allowing hackers to exploit victims' accounts without requiring any action from them.
- How are scammers using your face to commit fraud?how cautious are you about how your face is used on the internet? if you do not appreciate the importance of this, you should change it immediately.