Microsoft Macros Remain Top Vector for Malware Delivery
#1
Quote:Attacks using malicious Microsoft macros, always a popular method for compromising target machines, are more virulent than ever, accounting for 45 percent of all delivery mechanisms analyzed in August.

Just behind this tried-and-true method lies the Microsoft Office Memory Corruption Vulnerability (CVE-2017-11882), a bug that allows the attacker to perform arbitrary code-execution. In a report released Thursday from Cofense intelligence, it was shown to responsible for 37 percent of malware delivery last month, despite having been patched since last November.

The remaining 18 percent of delivery mechanisms spotted in August is mainly made up of batch scripts, PowerShell scripts and downloaders for Microsoft Windows scripting component (WSC) files (often seen in games). These all trail far, far behind the two leading vectors, with less than 6 percent of attacks each.

Source: https://threatpost.com/threatlist-micros...ry/137428/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Adobe Acrobat Reader DC 2025.001.20467
Adobe Acrobat Read...harlan4096 — 06:11
GFYI [Official] CheckMAL's AppCheck Pro...
tweet CheckMAL Secu...dhruv2193 — 17:10
Introducing Advanced Chat Privacy: Enhan...
Introducing Advanc...harlan4096 — 11:49
Brave 1.77.101
Release Channel 1....harlan4096 — 11:48
Opera118.0.5461.60
Hello! We are h...harlan4096 — 11:47

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (50)steakelask
avatar (44)Termoplenka
avatar (50)Toligo

[-]
Online Staff
There are no staff members currently online.

>