Fresh spam campaign targeting Microsoft Office with old malware

Cyber criminals are hitting European users with malicious RTF files that open up backdoor access

An active malware campaign is targeting Microsoft Office customers in Europe by distributing RTF files loaded with malicious code.

Although the flaw dubbed CVE-2017-11882 was fixed in 2017, Microsoft researchers have noticed a sharp rise in exploits for the remote code execution (RCE) vulnerability in the past few weeks.

The company's security intelligence team have warned about an increase in spam emails loaded with malware, which would allow an attacker to run malicious code on a user's machine without any interaction on their front. The messages are also being written in several European languages, suggesting its targets lie mainly in the UK and wider Europe.

"The CVE-2017-11882 vulnerability was fixed in 2017, but to this day, we still observe the exploit in attacks," the Microsoft team said. "Notably, we saw increased activity in the past few weeks. We strongly recommend applying security updates."

Once the attached RTF file is loaded, it will launch multiple scripts including PowerShell and PHP to download the payload, which in this case is a backdoor trojan. This will attempt to connect to a malicious domain which has been disconnected at the time of writing.

The vulnerability hinges on the Office software's failure to properly handle objects in memory. Specifically, the Microsoft Equation Editor, packaged into all supported versions of Microsoft Office since the year 2000, contains a stack buffer overflow vulnerability.

An attacker could take control of an affected system if a user is logged on with administrative rights, and then install other programs, or delete data. They could also create new user accounts with full administrative rights.

Microsoft fixed the vulnerability in November 2017, but it remains a popular method of attack among cyber criminals and continues to be actively exploited in various campaigns. It was, in fact, the third most widely-used exploit in 2018 according to analysis by IT firm Recorded Future.

This is because many users haven't yet implemented fixes to the software and are still considered ripe targets for a vulnerability that was fixed more than a year and a half ago.

Featured Resources

2021 Thales cloud security study

The challenges of cloud data protection and access management in a hybrid and multi cloud world

Free download

IDC agility assessment

The competitive advantage in adaptability

Free Download

Digital transformation insights from CIOs for CIOs

Transformation pilotes, co-pilots, and engineers

Free download

What ITDMs did next - and what they should be doing now

Enable continued collaboration and communication for hybrid workers

Most Popular

What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

24 Nov 2021
Nike to take customers into the metaverse with 'NIKELAND'
virtualisation

Nike to take customers into the metaverse with 'NIKELAND'

19 Nov 2021