Site icon WinCert

New Trojan executes when hovered over a Powerpoint link

<p>It seems that Hackers found a new way for spreading malware on Windows machines&period; A new malware will be installed on your machine even if you just hover over the powerpoint presentation file link&period; No macros&comma; visual basic or Javascript is required for activation of this malware&period;<&sol;p>&NewLine;<p>The file in question is a Powerpoint presentation file that potential victims receive as a file attachment in emails&period; Subject line usually contains the following lines&colon; &&num;8220&semi;RE&colon;Purchase orders &num;69812&&num;8221&semi; or &&num;8220&semi;Fwd&colon;Confirmation&&num;8221&semi;&period; The name of the file is order&amp&semi;prsn&period;ppsx&&num;8221&semi;&comma; &&num;8220&semi;order&period;ppsx&&num;8221&semi;&comma; or &&num;8220&semi;invoice&period;ppsx&&num;8221&semi;&period; Infected file may also be packed in the &period;zip file&period;<&sol;p>&NewLine;<p>This method was used in spam campaigns in order to install a bank-fraud backdoor also knows as Gootkit&comma; Zusy or Otlard&period; A PowerShell tool is invoked once the target hovers over the embedded hyperlink in the attached Powerpoint file and installs the malware&period; Users that are using the newer versions of Microsoft Office &lpar;2010 and above&rpar; should receive a warning because of the Protected View feature &lpar;picture below&rpar;&period; Protected View is a read-only mode where most editing functions are disabled&period;<&sol;p>&NewLine;<div id&equals;"attachment&lowbar;2176" style&equals;"width&colon; 780px" class&equals;"wp-caption alignnone"><a href&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;wp-content&sol;uploads&sol;2017&sol;06&sol;hover&lowbar;powerpoint&period;png"><img aria-describedby&equals;"caption-attachment-2176" class&equals;"wp-image-2176 size-full" title&equals;"powerpoint" src&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;wp-content&sol;uploads&sol;2017&sol;06&sol;hover&lowbar;powerpoint&period;png" alt&equals;"powerpoint" width&equals;"770" height&equals;"491" &sol;><&sol;a><p id&equals;"caption-attachment-2176" class&equals;"wp-caption-text">Image source&colon; Microsoft<&sol;p><&sol;div>&NewLine;<p>&nbsp&semi;<&sol;p>&NewLine;<p>Spam campaigns with malicious contents can spread rapidly&comma; but for now&comma; the success rate for this hover technique is still unknown&period;If only half percent of internet users would activate this malware&comma; it would pose a huge security threat to many organizations and&comma; individual users&comma; especially if those users are using the older versions of Microsoft Office&period;<&sol;p>&NewLine;<p>In order to avoid infection with this malware Microsoft suggests using the Protected View&comma; that should be enabled by default&comma; especially for the files downloaded from the internet&period;<&sol;p>&NewLine;

Exit mobile version