Earlier,
Researchers at Trustwave said the virus uses a combination of methods that begin with an .DOCX embedding. Victims receive by e-mail various letters related to finance. All e-mails discovered by experts included an attachment named "receipt.docx".
The process of attack with four steps begins with opening the .DOCX file and launching the built-in OLE object containing links. This allows you to refer to external access to remote OLE objects. According to researchers, attackers use the fact that Word documents created with Microsoft Office 2007 use the Open XML format, which is based on XML technologies and ZIP archives. Therefore, such files can be easily manipulated programmatically or manually.
The second step is to use the Word file to start downloading the file with the RTF extension. The latter resorts to the vulnerability of the Office Equation Editor, closed by Microsoft in November last year. The third step is to decode the text inside the RTF file, which in turn runs the MSHTA command line, and it loads and opens the HTA file. The latter contains a script PowerShell, which performs malicious software Password Stealer. This virus steals credentials from e-mail, FTP and browser programs.
Experts noted an unusually large number of stages and scenarios used by this virus. In addition, DOCX, RTF, and HTA files are rarely blocked by mail or network gateways, unlike more obvious ones such as VBS, JScript, or WSF.
Do not forget, you should not open files received from unknown senders.
O my God 😰! We are yet to be Safe from theose bad hackers.. Ahh! What's their problem? Okay! Noted sir!
ReplyDeleteThanks for the info.
Hackers will always do their thing.
ReplyDeleteThanks for this info it is very helpful and we need to be extremely careful.
We will take this your info very seriously.. Hackers are everywhere now.. We will be extremely careful. Thanks
ReplyDeleteHackers never sleep always working hard, thinking of possible methods of hacking, gonna be extremely careful thanks for the information
ReplyDelete