Attackers are often in search of vulnerabilities through which they can exploit the machine and install malware. This time around a vulnerability in the Windows Object Linking Embedding (OLE) is being exploited via the Microsoft PowerPoint by the attackers.
As per a report from security firm Trend Micro the most common type of interface that is used to exploit the vulnerability is the use of Rich Text File. All of this is done by wearing a masquerade of PowerPoint slideshows. The modus operandi is however pretty typical, an email containing an attachment is sent. Content in the email is readied in such a way that it gains the immediate attention of the recipient and also maximises the chances of a response.
Apparently, the attached document is a PPSX file which is a file format associated with the PowerPoint. This format only offers playback of the slide but the edit options are locked out. In case the file is opened it will just display the following text, ‘CVE-2017-8570. (Another vulnerability for Microsoft Office.)’.
The Trojan can record keystrokes, capture screenshots, record videos and also download other malware. In essence, the attacker will be in full control of your computer and can literally cause severe damage by stealing all your information including banking passwords. The use of PowerPoint file is a clever touch since the anti virus engine will be searching for RTF file.
All said and done, Microsoft has already patched the vulnerability way back in April and this is one of the reasons why we suggest folks to keep their PC’s updated. Yet another quintessential tip is to avoid downloading attachments from unknown sources, just don’t do it.
RELATED STORIES YOU NEED TO CHECK OUT: