Protect yourself from infected MS Office files

Oct. 8, 2017 1 comment ADMIN Magazine Detection & Response microsoft secure security

Attacks based on Office files have increased rapidly in the past few months. They seem to be far less harmless than ZIP or even EXE files in your mailbox, but when combined with a meaningfully worded email, users are too easily tempted to open the infected files. Although macros generally still need to be enabled, the Microsoft Word Intruder (MWI) attack uses unresolved vulnerabilities. Just opening the file compromises the computer. The spread of malware or crimeware has not slowed down – on the contrary. Back in the early 1990s, the first tools that greatly facilitated the process of creating malicious code were released, opening this vector to beginners. Examples of this include the Virus Creation Laboratory (VCL) or the Phalcon-Skism Mass Produced Code Generator (PS-MPC), both still under MS-DOS. Nothing has changed here – just like then, new tools and kits are still published at regular intervals. The biggest difference compared with the 1990s is that now the kits are used for ...

http://www.admin-magazine.com/Archive/2016/34/Protect-yourself-from-infected-MS-Office-files/(tag...

Avatar
ariadnalunguco 2 months ago

Although I didn't quite understand everything, all in all it was a good and helpful article for me. I still have to read more on the subject to better get the whole idea.

Reply