Software

Latest Word vulnerability and the usual reminder

‘Patch Tuesday’ looms again: the next scheduled Security Bulletin release is 12th December, so get ready for next week’s patches.

Hopefully, Microsoft will manage to include a patch for the vulnerability currently being exploited in what the company refers to as ‘limited “zero-day” attacks’. The vulnerability is present in Microsoft Word 2000, Microsoft Word 2002, Microsoft Office Word 2003, Microsoft Word Viewer 2003, Microsoft Word 2004 for Mac, and Microsoft Word 2004 v. X for Mac, as well as Microsoft Works 2004, 2005, and 2006.

It seems the attack can only be carried out if a user first opens a malicious Word file which is attached to an email or has been delivered by the attacker in some other way.

Doubtless Microsoft will provide more information as investigations proceed; we’re monitoring the situation. In the meantime, Microsoft is advising its customers as ‘a best practice’, to exercise extreme caution when opening unsolicited attachments from both known and unknown sources.

Latest Word vulnerability and the usual reminder

Your email address will not be published. Required fields are marked *

 

Reports

Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Lazarus covets COVID-19-related intelligence

As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available. We have found evidence that the Lazarus group is going after intelligence that could help these efforts by attacking entities related to COVID-19 research.

Sunburst: connecting the dots in the DNS requests

We matched private and public DNS data for the SUNBURST-malware root C2 domain with the CNAME records, to identify who was targeted for further exploitation. In total, we analyzed 1722 DNS records, leading to 1026 unique target name parts and 964 unique UIDs.

Subscribe to our weekly e-mails

The hottest research right in your inbox