Timeline
April 12th 2022 —
first report to Microsoft MSRC, by leader of Shadowchasing1, an APT hunting group. This document is an in the wild, real world exploit targeting Russia, themed as a Russian job interview.
April 21st 2022 — Microsoft MSRC closed the ticket saying not a security related issue (for the record, msdt executing with macros disabled is an issue):
May ?? 2022 — Microsoft may have tried to fix this or accidentally fixed it in Office 365 Insider channel, without documenting a CVE or writing it down anywhere. The other products remain vulnerable.
May 27th 2022 — Security vendor Nao
tweet a document uploaded from Belarus, which is also an in the wild attack.
May 27th 2022 — reported back to MSRC.
May 29th 2022 — I identified this was a zero day publicly as it still works against Office 365 Semi Annual channel, and ‘on prem’ Office versions and EDR products are failing to detect.
Two days ago, Nao_sec identified an odd looking Word document in the wild, uploaded from an IP address in Belarus:
doublepulsar.com