PowerPoint exploit makes Windows vulnerable to cyber attacks

Sean Jeffries avatar. By: Sean Jeffries
2 minute read
powerpoint vulnerability

Home » PowerPoint exploit makes Windows vulnerable to cyber attacks

Attackers are often in search of vulnerabilities through which they can exploit the machine and install malware. This time around a vulnerability in the Windows Object Linking Embedding (OLE) is being exploited via the Microsoft PowerPoint by the attackers.

 

As per a report from security firm Trend Micro the most common type of interface that is used to exploit the vulnerability is the use of Rich Text File. All of this is done by wearing a masquerade of PowerPoint slideshows. The modus operandi is however pretty typical, an email containing an attachment is sent. Content in the email is readied in such a way that it gains the immediate attention of the recipient and also maximises the chances of a response.

Apparently, the attached document is a PPSX file which is a file format associated with the PowerPoint. This format only offers playback of the slide but the edit options are locked out. In case the file is opened it will just display the following text, ‘CVE-2017-8570. (Another vulnerability for Microsoft Office.)’.

In reality, opening the file will trigger an exploit for another vulnerability named CVE-2017-0199 and then it will offload the malicious code via the PowerPoint animations. Eventually, a file called logo.doc will be downloaded. The document is made up of an XML file with JavaScript code which is used to run a PowerShell command and download the malicious program called ‘RATMAN.exe.’ which is a remote access Trojan referred to as .

The Trojan can record keystrokes, capture screenshots, record videos and also download other malware. In essence, the attacker will be in full control of your computer and can literally cause severe damage by stealing all your information including banking passwords. The use of PowerPoint file is a clever touch since the anti virus engine will be searching for RTF file.

All said and done, Microsoft has already patched the vulnerability way back in April and this is one of the reasons why we suggest folks to keep their PC’s updated. Yet another quintessential tip is to avoid downloading attachments from unknown sources, just don’t do it.

RELATED STORIES YOU NEED TO CHECK OUT:

Discussions

Next up

Top 9 tools to create stunning digital ads for your marketing campaign

Tashreef Shareef avatar. By: Tashreef Shareef
2 minute read

“A picture is worth a thousand words” is a popular English idiom and the quote perfectly describes digital marketing or marketing strategies in general that […]

Continue Reading

5 Christmas sweaters with lights and music for your loved ones

Madhuparna Sukul avatar. By: Madhuparna Sukul
Less than a 1 minute read

While the winter arrives with the joy of Christmas, it also brings the freezing weather along. Of course, there’s the fireplace to warm you up, […]

Continue Reading

Users claim Microsoft still collects activity history despite being disabled

Giles Ensor avatar. By: Giles Ensor
3 minute read

Recent comments on Reddit would suggest that Microsoft is still not playing the game when it comes to collecting data on its users. This is […]

Continue Reading