New
#1
This is yet another reason why you pay close attention to received files and links. NEVER open anything suspicious!
The bug affects all supported versions of Microsoft Word, but will be fixed this week.
Attackers are exploiting a previously undisclosed vulnerability in Microsoft Word, which security researchers say can be used to quietly install different kinds of malware -- even on fully-patched computers.
Unlike most document-related vulnerabilities, this zero-day bug that has yet to be patched doesn't rely on macros -- in which Office typically warns users of risks when opening macro-enabled files.
Instead, the vulnerability is triggered when a victim opens a trick Word document, which downloads a malicious HTML application from a server, disguised to look like a Rich Text document file as a decoy. The HTML application meanwhile downloads and runs a malicious script that can be used to stealthily install malware.Hackers are attacking Word users with new Microsoft Office zero-day vulnerability | ZDNetA Microsoft spokesperson confirmed that the company will issue a fix for the bug on Tuesday as part of its monthly release of security fixes and patches.
This is yet another reason why you pay close attention to received files and links. NEVER open anything suspicious!
Microsoft patches Word zero-day booby-trap exploit Naked SecurityMicrosoft Tuesday patched a previously undisclosed Word zero-day vulnerability attackers used to install a variety of malware on victims’ computers.
WSH, cough, WSH. By simply disabling WSH , you can disable sooo much malware, without AV.
reg add "HKLM\Software\Microsoft\Windows Script Host\Settings" /v "Enabled" /t REG_DWORD /d "0" /f
The .hta content is disguised as a normal RTF file to evade security products, but we can find the malicious Visual Basic scripts in a later part of the file: