Hackers have been found exploiting a freshly-uncovered vulnerability in Microsoft’s software to install malware on business computers.
According to security researchers, since last month a Russia-linked hacking group known as APT28 have been using a Microsoft protocol called Dynamic Data Exchange (DDE) to run malicious code through a poisoned Word document.
Targeted attacks linked to APT28 (also sometimes known as the “Fancy Bear” hacking gang) have taken advantage of the recent New York City terror incident in an attempt to plant spyware via the method.
DDE, as its name suggests, allows messages and data to be shared between applications. Last month it was discovered that it was possible to launch attacks exploiting DDE through Word documents, Excel spreadsheets and Outlook, even when macros have not been enabled.
Now, of course, attacks exploiting Microsoft Office documents are nothing new – and most of us who work in the security industry know to be wary of enabling macros when opening files, because of the potential for malicious code to be executed.
But with this DDE attack you will see no prompt to enable macros. This lack of a warning allows attackers to side-step an obstacle which has often acted as a final safety net for their intended victims.
Instead, the most you might notice that’s unusual is a pop-up messagebox asking if you want to update the document with data from linked files.
“This document contains links that may refer to other files. Do you want to update the document with the data from the linked files?”
Microsoft, in a security advisory released yesterday, has described how the technique could be used in a typical email attack:
In an email attack scenario, an attacker could leverage the DDE protocol by sending a specially crafted file to the user and (Read more...)
This is a Security Bloggers Network syndicated blog post authored by Graham Cluley. Read the original post at: The State of Security