- Content source
- https://gbhackers.com/office-vulnerabilities/
Full Story on:The Cloud Atlas threat group, active since 2014, continues to pose a significant risk to organizations in Eastern Europe and Central Asia through sophisticated attacks leveraging legacy Microsoft Office vulnerabilities.
Security researchers have documented the group’s expanded arsenal and evolving infection chains deployed throughout the first half of 2025, revealing previously undescribed implants and attack methodologies.
Cloud Atlas initiates attacks through carefully crafted phishing emails containing malicious Word documents (DOC/DOCX attachments).
Upon opening, these documents trigger a cascading infection chain that exploits CVE-2018-0802, a vulnerability in the Microsoft Office Equation Editor process.
Cloud Atlas Exploits Office Vulnerabilities to Execute Malicious Code
The Cloud Atlas threat group, active since 2014, continues to pose a significant risk to organizations in Eastern Europe and Central Asia through sophisticated attacks.
gbhackers.com
