Russian hacking tool gets extra stealthy to target US, European computers

Discussion in 'malware problems & news' started by guest, Nov 20, 2018.

  1. guest

    guest Guest

    Russian hacking tool gets extra stealthy to target US, European computers
    This malicious software will email your hacker from your computer without you ever knowing
    November 20, 2018

    https://www.cnet.com/news/new-russi...tra-stealthy-to-target-us-european-computers/
     
  2. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,941
    Location:
    USA
    From the end of the c|net article...

    They could use a service like MailWasher and open the email while it's still on a Firetrust server, which would give the recipient an idea of what the email contained without it ever touching the user's machine.
     
  3. longshots

    longshots Registered Member

    Joined:
    Oct 20, 2017
    Posts:
    537
    Location:
    Australia
    While "hacking tool gets extra stealthy" the method of delivery hasn't changed.
     
  4. Stefan Froberg

    Stefan Froberg Registered Member

    Joined:
    Jul 30, 2014
    Posts:
    747
    You right, same old ***** but people still fall to it...
    I remember the first lessons that my computer teacher told "Always keep macros disabled and never enable them unless you are really,really, really sure". And that was over two decades ago...
     
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    This attack had nothing to do with Word macro usage:
    I am assuming that as long as the .docx file was open in Protected Mode, the remote template download would be blocked. However, since templates are internally integrated into Word, I am not 100% sure this would be the case.
     
    Last edited: Nov 20, 2018
  6. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Also the following Reddit posting is a bit disturbing in that it appears remote template loading is indeed allowed in Protected Mode. So the main question is if a malicious remote template download could bypass Protected Mode? Entirely possible I believe on older MS Office versions that do not use AppContainer.
    https://superuser.com/questions/98983/word-documents-looking-for-template-on-network-drive
     
  7. Stefan Froberg

    Stefan Froberg Registered Member

    Joined:
    Jul 30, 2014
    Posts:
    747

     
  8. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Ok, I got lazy and didn't read the Palo Alto article.

    Implied but not specifically stated in the article is that the macro execution in the downloaded remote template to execute the macro imbedded in the Word document will override Word macro block security settings. So I guess that needs to be checked out.

    I also checked out my MS Word default template settings and only templates from local directories are allowed. So I am assuming one has to receive some type of alert in Word to allow the remote template download?
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.