Fresh spam campaign targeting Microsoft Office with old malware

Cyber criminals are hitting European users with malicious RTF files that open up backdoor access

An active malware campaign is targeting Microsoft Office customers in Europe by distributing RTF files loaded with malicious code.

Although the flaw dubbed CVE-2017-11882 was fixed in 2017, Microsoft researchers have noticed a sharp rise in exploits for the remote code execution (RCE) vulnerability in the past few weeks.

The company's security intelligence team have warned about an increase in spam emails loaded with malware, which would allow an attacker to run malicious code on a user's machine without any interaction on their front. The messages are also being written in several European languages, suggesting its targets lie mainly in the UK and wider Europe.

"The CVE-2017-11882 vulnerability was fixed in 2017, but to this day, we still observe the exploit in attacks," the Microsoft team said. "Notably, we saw increased activity in the past few weeks. We strongly recommend applying security updates."

Once the attached RTF file is loaded, it will launch multiple scripts including PowerShell and PHP to download the payload, which in this case is a backdoor trojan. This will attempt to connect to a malicious domain which has been disconnected at the time of writing.

The vulnerability hinges on the Office software's failure to properly handle objects in memory. Specifically, the Microsoft Equation Editor, packaged into all supported versions of Microsoft Office since the year 2000, contains a stack buffer overflow vulnerability.

An attacker could take control of an affected system if a user is logged on with administrative rights, and then install other programs, or delete data. They could also create new user accounts with full administrative rights.

Microsoft fixed the vulnerability in November 2017, but it remains a popular method of attack among cyber criminals and continues to be actively exploited in various campaigns. It was, in fact, the third most widely-used exploit in 2018 according to analysis by IT firm Recorded Future.

This is because many users haven't yet implemented fixes to the software and are still considered ripe targets for a vulnerability that was fixed more than a year and a half ago.

Featured Resources

Key considerations for implementing secure telework at scale

Identifying the security risks and advanced requirements of a remote workforce

Download now

The State of Salesforce 2020

Your guide to getting the most from Salesforce

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Rethink your cybersecurity strategy for the new world

5 steps to secure the enterprise and be fit for a flexible future

Download now

Recommended

Andrew Daniels joins Druva as CIO and CISO
Cloud

Andrew Daniels joins Druva as CIO and CISO

22 Jul 2020
University of California gets fleeced by hackers for $1.14 million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Australia announces $1.35 billion investment in cyber security
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
CSA and ISSA form cyber security partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

3 Aug 2020
How to use Chromecast without Wi-Fi
Mobile

How to use Chromecast without Wi-Fi

4 Aug 2020
How do I fix the Windows 10 Start Menu if it's frozen?
operating systems

How do I fix the Windows 10 Start Menu if it's frozen?

3 Aug 2020