Security News > 2017 > October > Locky Ransomware Spam Infects via Microsoft Office

2017-10-20 11:19
Look Ma, No Macros: Malicious Spam Wields Windows Application-Linking FeatureSpammers wielding Locky ransomware have a new trick up their sleeve: the ability to infect PCs via malicious Microsoft Word documents that use the Dynamic Data Exchange application-linking feature built into Windows to push ransomware onto victims' systems.
News URL
https://www.inforisktoday.com/locky-ransomware-spam-infects-via-microsoft-office-a-10392
Related news
- Fake Microsoft Office add-in tools push malware via SourceForge (source)
- Microsoft: New Windows scheduled task will launch Office apps faster (source)
- Hijacked Microsoft web domain injects spam into SharePoint servers (source)
- Microsoft: Windows CLFS zero-day exploited by ransomware gang (source)
- Microsoft: Windows CLFS Vulnerability Could Lead to ‘Widespread Deployment and Detonation of Ransomware’ (source)
- Microsoft releases emergency update to fix Office 2016 crashes (source)
- Microsoft blocks ActiveX by default in Microsoft 365, Office 2024 (source)
- Microsoft: Office 2016 and Office 2019 reach end of support in October (source)
- Microsoft fixes machine learning bug flagging Adobe emails as spam (source)
- Microsoft fixes Exchange Online bug flagging Gmail emails as spam (source)