Remcos Alert: Ingenious Excel Phishing Campaign Spreading Dangerous Fileless Malware
Excel users need to be on guard as a newly discovered phishing campaign is targeting Microsoft's spreadsheet application.
This campaign distributes a new fileless malware version of a dangerous remote access Trojan that is being distributed through a Microsoft 365 (formerly Microsoft Office) vulnerability - and is now being actively exploited.
Hackers are targeting Excel to spread dangerous malware
Always on the front lines, Fortinent's Fortiguard Labs has uncovered a phishing campaign targeting Excel users.
The attack uses a phishing email lure disguised as a shipping order with a malicious Microsoft Excel spreadsheet attached. Once downloaded and opened, the spreadsheet exploits a remote code execution vulnerability (CVE-2017-0199) to download the HTML application.
Once downloaded, the HTML application executes and attempts to download another file – the actual Remcos malware. Remcos is a well-known remote access Trojan that can give attackers a direct line into an infected computer. It is one of many dangerous malware types that can be purchased in neat packages on underground hacker forums.
This time, however, researcher Xiaopeng Zhang found a fileless variant of the Remcos RAT that works with the infected system's memory, allowing it to evade detection by anti-malware tools. It also adds a specific autorun system registry to "maintain persistence and control over the victim's device across reboots"—another example of persistent malware.
Remcos RAT operators can use keyloggers and screen recorders to collect private information, audio, and other data. The stolen data is then encrypted and sent back to the operator, where it can be exploited.
Keep Microsoft 365 and your computer up to date to stay safe!
Unfortunately, the research does not indicate specific versions of Microsoft Excel affected by this vulnerability. Although the CVE-2017-0199 note does list older versions of Excel and Office under 'Known Affected Software Configurations,' that section has not been updated since the phishing campaign was discovered.
So when in doubt, keep Microsoft 365 and your operating system up to date. If possible, upgrade to the latest version of Microsoft 365 for maximum security.
You should read it
- What is Fileless Malware?
- Learn about fileless malware Astaroth
- Fileless malware - Achilles heel of traditional antivirus software
- What is Safe Malware? Why is it so dangerous?
- 10 typical malware types
- Warning: The malware campaign hides the shadow of gift emails from Amazon
- The Purple Fox malware targets vulnerable Windows systems worldwide
- The malware detection is extremely dangerous, unable to destroy even if the operating system is reinstalled and the hard drive is replaced
- The 4 most common ways to spread malware today
- Android malware believed to be spreading from Vietnam has attacked more than 10,000 Facebook accounts in 140 countries
- This malware was written in an unusual programming language, making it extremely difficult to detect
- 5 ways malware can easily infect a Mac
Maybe you are interested
Here's everything Microsoft knows about your PC!
How to enable Extension Performance Detector in Microsoft Edge
Microsoft: TPM 2.0 in Windows 11 is mandatory and 'non-negotiable'
New Microsoft 365 Attack Can Break 2FA
Microsoft still recommends 15-year-old backup solution for Windows 11 and 10 users
How to disable custom scroll bars on Microsoft Edge