SEE: Information security incident reporting policy (Tech Pro Research) Must-read security coverage hta file (disguised as an RTF document), giving the hacker full code execution on the victim’s computer, the report noted. Once the user tries to open the file, a malicious HTML application is downloaded from the attacker’s server and is then executed as an. The problem starts when a user is sent a fake Word document from the attacker. The hack affects all versions of Office, the report noted, including the latest version of Office 2016 on Windows 10. The attack was first detailed in a report from McAfee, which also offered steps that business users could take to protect themselves.Īccording to the report, the attacks started in January and leverage a vulnerability that hadn’t yet been disclosed. Microsoft Office users beware: A new exploit is using fake versions of Office files–like Word documents–to install malware on a victim’s computer. ‘Critical’ Microsoft Office hack uses fake Word documents to install malwareĪ new exploit, reported by McAfee, uses trick Microsoft office files to install malware on a user's machine and can bypass existing protection methods.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |