PowerPoint exploit makes Windows vulnerable to cyber attacks

by Madalina Dinita
Madalina Dinita
Madalina Dinita
Windows & Software Expert
Madalina has been a Windows fan ever since she got her hands on her first Windows XP computer. She is interested in all things technology, especially emerging technologies... read more
Affiliate Disclosure
powerpoint vulnerability

Attackers are often in search of vulnerabilities through which they can exploit the machine and install malware. This time around a vulnerability in the Windows Object Linking Embedding (OLE) is being exploited via the Microsoft PowerPoint by the attackers.


As per a report from security firm Trend Micro the most common type of interface that is used to exploit the vulnerability is the use of Rich Text File. All of this is done by wearing a masquerade of PowerPoint slideshows. The modus operandi is however pretty typical, an email containing an attachment is sent. Content in the email is readied in such a way that it gains the immediate attention of the recipient and also maximises the chances of a response.

Apparently, the attached document is a PPSX file which is a file format associated with the PowerPoint. This format only offers playback of the slide but the edit options are locked out. In case the file is opened it will just display the following text, ‘CVE-2017-8570. (Another vulnerability for Microsoft Office.)’.

In reality, opening the file will trigger an exploit for another vulnerability named CVE-2017-0199 and then it will offload the malicious code via the PowerPoint animations. Eventually, a file called logo.doc will be downloaded. The document is made up of an XML file with JavaScript code which is used to run a PowerShell command and download the malicious program called ‘RATMAN.exe.’ which is a remote access Trojan referred to as .

The Trojan can record keystrokes, capture screenshots, record videos and also download other malware. In essence, the attacker will be in full control of your computer and can literally cause severe damage by stealing all your information including banking passwords. The use of PowerPoint file is a clever touch since the anti virus engine will be searching for RTF file.

All said and done, Microsoft has already patched the vulnerability way back in April and this is one of the reasons why we suggest folks to keep their PC’s updated. Yet another quintessential tip is to avoid downloading attachments from unknown sources, just don’t do it.


This article covers:Topics: