Microsoft warns about email spam campaign abusing Office vulnerability

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
Microsoft's security researchers have issued a warning on Friday afternoon about an ongoing spam wave that is spreading emails carrying malicious RTF documents that infect users with malware without user interaction, once users open the RTF documents.

Microsoft said the spam wave appears to target European users, as the emails are sent in various European languages.

"In the new campaign, the RTF file downloads and runs multiple scripts of different types (VBScript, PowerShell, PHP, others) to download the payload," the Microsoft Security Intelligence team said.
The final payload is a backdoor trojan, Microsoft said. Fortunately, the trojan's command and control server appears to have gone down by Friday, when Microsoft issued its security alert.
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,170
This vulnerability was patched in the year 2018, but is still dangerous in Enterprises. The infection chain is well known:
RTF file > MS Office > vulnerability in Equation Editor > dropped malicious Microsoft Word plugin WLL to Word startup folder.
The weaponized RTF file can be delivered in several ways, for example, as a spam attachment (RTF document or RTF embedded in PDF document), or via phishing URL to the weaponized document, etc.
 
Last edited:

upnorth

Moderator
Verified
Staff Member
Malware Hunter
Well-known
Jul 27, 2015
5,459
This vulnerability was patched in the year 2018.
It was actually patched already 2017 but, the problem is sadly not that easy automatically fixed.
Users who applied the November 2017 Patch Tuesday security updates should be safe.
it is known that many users and companies often fail or forget to install security updates in a timely manner.
Malware operators have jumped on this exploit and have weaponized it ever since the end of 2017, knowing they'll have ample time to take advantage of forgetful users who don't bother with security updates. And they did. They used the exploit over and over again, numerous times. A Recorded Future report ranked the CVE-2017-11882 as the third-most exploited vulnerability of 2018, and similar Kaspersky report also ranked it at the top of the list.
threat-landscape-2016-2018.png

 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,170
It was actually patched already 2017 but, the problem is sadly not that easy automatically fixed.



threat-landscape-2016-2018.png

The article:
refers to another article from FireEye Labs:
"For example, this week, in two different reports [1, 2], FireEye said CVE-2017-11882 was shared among different Chinese cyber-espionage groups."
This fragment is somewhat misguiding because the first reference is an article:
which correctly informs that the malware exploits Microsoft Office vulnerabilities CVE-2017-11882 and CVE-2018-0802, both are related to eqnedt.exe (the second vulnerability is from the year 2018). (y)
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top