Security News
The VBA macro leverages compromised victims' Microsoft Outlook email accounts to send spear-phishing emails to their contacts - rapidly widening the potential attack surface. Researchers say, while abusing a compromised mailbox to send malicious emails is not a new technique, this is the first publicly documented case of an attack group using both an Outlook macro and an OTM file to do so.
For more than five months, Lastline security researchers have tracked the evolution of malicious Excel 4.0 macros, observing the fast pace at which malware authors change them to stay ahead of security tools. A central part of many organizations' productivity tools, Excel opens the door for phishing attacks where victims are tricked into enabling macros in malicious documents, which can results in the attackers gaining a foothold on the network, in preparation for additional activities.
Hackers have updated the age-old Excel malware attack technique with a new passwordless twist. Researchers from security firm Trustwave said they discovered a new malspam campaign that sends Excel 4.0 xls 97-2003 files with a compromised macro in email messages.
A most entertaining piece of threat research from Check Point gives a unique insight into the "Working" life of a Nigerian email spammer who made thousands of dollars from stolen credit cards alone in recent years. Behind that facade of respectability, "Dton" was in fact an email spammer - a spammer working as part of a Nigerian cybercrime syndicate that generates its ill-gotten gains through buying and using stolen credit card details.
Using Containers, Malicious Documents Will Be Isolated in Office 365A handful of common lures still have astounding success in compromising computers: phishing emails, malicious links and the king...
Microsoft seems a bit hazy on what 'disable' actually means A security hole in Office for Mac can be exploited by miscreants to potentially run malicious code on victims' shiny computers without...
Microsoft Office for Mac does not properly disable XLM macros, thus exposing users to code execution attacks, the CERT Coordination Center (CERT/CC) at Carnegie Mellon University warns. read more
Remove LibreLogo now Updated Update: See our note below: LibreOffice version 6.2.5, which was supposed to patch the macro security hole, is still vulnerable, and exploit code is now available....
Vulnerable version still on main download page, use 6.2.5 instead The Document Foundation has recently patched LibreOffice, its open-source office suite, to fix an issue where documents can be...
Dutch authorities this week announced the arrest a 20-year old man for allegedly developing and distributing Office Macro Builders. read more