Author Topic: MS Office banking trojan  (Read 388 times)

0 Members and 1 Guest are viewing this topic.

Offline Maik

  • Administrator
  • Forum Deity
  • *****
  • Posts: 11958
MS Office banking trojan
« on: Tuesday, 11 April, 2017 @ 17:43:56 »
Quote
Microsoft Office zero-day being exploited to spread malware, but no patch available… yet

Malicious hackers are exploiting an as-yet-unpatched security vulnerability in Microsoft Office products in attacks designed to secretly infect targeted computers with malware.

The vulnerability is thought to be in all versions of Microsoft Office, including Office 2016 running on Windows 10.

However, if you use Protected View to open Office documents, you should be able to read the files without risk of activating the malicious code.
https://hotforsecurity.bitdefender.com/blog/microsoft-office-zero-day-being-exploited-to-spread-malware-but-no-patch-available-yet-17898.html

Apparently the zero-day is being used to spread a banking Trojan, according to bleepingcomputer and other sources. Mainly spread via MS Word but appears it could also be carried via an MS Excel file.

Good news is that Microsoft plan to protect Office via a security patch due for release today.

Offline Maik

  • Administrator
  • Forum Deity
  • *****
  • Posts: 11958
Re: MS Office banking trojan
« Reply #1 on: Wednesday, 12 April, 2017 @ 14:13:29 »
Quote
Fortunately there is now some good news, as on Tuesday Microsoft released its regular bundle of security patches - including a fix for the Office zero-day vulnerability.

It turns out that that wasn't the only zero-day vulnerability fixed by Microsoft in this month's patch update. An elevation of privilege vulnerability in Internet Explorer that would allow an attacker to convince a user to visit a compromised website, was also fixed.

In all Microsoft has released fixes for over 40 unique vulnerabilities, 13 of which are rated "critical."

Make sure that you have installed the latest security patches at your earliest opportunity. Home users and small businesses may in particular appreciate the benefits of turning on automatic updates.

By the way, Microsoft has this month redesigned the way in which it communicates details of the security holes it has patched - doing away with its familiar security bulletins and replacing it with a new-look Security Update Guide.

Personally, I find the new layout rather confusing to navigate and less than helpful. But maybe that's just my lack of familiarity with the way it's designed. I would be interested in hearing readers' feedback.

Finally, this Patch Tuesday bundle marks the end of Microsoft's extended support for Windows Vista. The company won't be issuing security updates for Vista anymore. You have been warned...
https://www.grahamcluley.com/microsoft-patches-word-zero-day-vulnerability-actively-exploited-attacks/