{"id":51261,"date":"2021-07-19T09:18:19","date_gmt":"2021-07-19T07:18:19","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=39946"},"modified":"2021-10-29T16:38:33","modified_gmt":"2021-10-29T14:38:33","slug":"malware-hidden-in-office-files","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/cybersecurity-blog\/malware-hidden-in-office-files\/","title":{"rendered":"Malware hidden in Office files"},"content":{"rendered":"<p>A new<strong> phishing campaign<\/strong> has appeared distributing the <strong>ZLoader malware<\/strong> using documents <strong>Microsoft Office<\/strong> as a Trojan horse to access our system, according to a report generated by the security firm Forcepoint X-Labs.<\/p>\n\n\n\n<p>To train you in Cybersecurity and be able to aspire to positions of&nbsp;<strong>Address<\/strong>&nbsp;in the area of&nbsp;<strong>cybersecurity<\/strong>&nbsp;and of&nbsp;<strong>expert<\/strong>&nbsp;in&nbsp;<strong>Informatic security<\/strong>&nbsp;With solid technological and managerial knowledge, the <a href=\"https:\/\/eiposgrados.com\/eng\/master-in-cybersecurity\/\" data-type=\"URL\" data-id=\"https:\/\/eiposgrados.com\/master-en-ciberseguridad\/\">Master in Cybersecurity, Ethical Hacking and Offensive Security<\/a> You will train with specialized professionals. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Phishing attacks<\/h2>\n\n\n\n<p>The<strong> phishing attacks<\/strong> are the order of the day, normally, they try to access our systems by posing as a trusted company or organization (Netflix, Amazon, DGT, electricity companies, etc.) so that in this way the victim trusts and downloads the file with malware.<\/p>\n\n\n\n<p>The report describes the <strong>malicious attachment<\/strong> in these emails as a Microsoft Word attachment in MHTML format with a randomly generated file name. MHTML is a web page archive file format that is compatible with web-based technologies.<\/p>\n\n\n\n<p>In this case the <strong>phishing emails <\/strong>They use a billing decoy, the message may vary, but the purpose is the same, for the user to download the office file.<\/p>\n\n\n\n<p>If the<strong> phishing victim<\/strong>, by downloading and opening the Microsoft Word attachment, you will enable the<strong> macros<\/strong>, triggers the download of an encrypted Excel sheet in which the final payload of the malware is hidden.<\/p>\n\n\n\n<p>\u201cAfter downloading the XLS file, Word VBA reads the cell content from XLS and creates a new macro for the same XLS file and writes the cell content into XLS VBA macros as functions.\u201d They said <strong>researchers<\/strong>. \u201cOnce the macros are written and ready, the Word document sets the registry policy to &#039;Disable Excel Macro Warning&#039;. It then invokes the malicious macro function from the Excel file. The Excel file now downloads the ZLoader payload. The ZLoader payload is then executed using rundll32.exe.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Example of malicious attachment<\/h2>\n\n\n\n<p>ZLoader is a <strong>multipurpose trojan<\/strong> which often acts as a dropper delivering Zeus-based malware in multi-stage ransomware attacks, such as Ryuk and Egregor.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/07\/ejemplo-malwero-oculto-en-archivos-de-Office-1024x271.jpg\" alt=\"malware hidden in office files\" class=\"wp-image-39947\" width=\"883\" height=\"233\" title=\"\"><\/figure><\/div>\n\n\n\n<p>As we can see in the image that a colleague has sent us, the subject indicates \u201cPayment for invoice FE-91996 is not accepted\u201d and then in the body of the message they tell us that we owe that invoice and that we must pay it before it is generate additional expenses, inviting us to <strong>open the file<\/strong> where we can see all the information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">We keep biting<\/h2>\n\n\n\n<p>The <strong>email scams <\/strong>invoicing are still effective since the targeted victim of phishing is likely to be receptive to anything to do with unpaid invoices and even returns. <\/p>\n\n\n\n<p>Malware has become increasingly difficult to detect and information theft will be inevitable if we do not raise awareness and acquire a daily cybersecurity routine.<\/p>\n\n\n\n<p>We recommend that you go through this post where we give you <a href=\"https:\/\/eiposgrados.com\/eng\/cybersecurity-blog\/the-5-cyber-commandments-for-2021\/\">5 cyber commandments<\/a> to improve your cybersecurity.<\/p>","protected":false},"excerpt":{"rendered":"<p>A new phishing campaign appears with malware hidden in office files, called Zloade. If you want to know more, keep reading!<\/p>","protected":false},"author":1,"featured_media":51625,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[],"class_list":["post-51261","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/51261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=51261"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/51261\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/51625"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=51261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=51261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=51261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}