Attackers are often in search of vulnerabilities through which they can exploit the machine and install malware. This time around a vulnerability in the Windows Object Linking Embedding (OLE) is being exploited via the Microsoft PowerPoint by the attackers.

 

As per a report from security firm Trend Micro the most common type of interface that is used to exploit the vulnerability is the use of Rich Text File. All of this is done by wearing a masquerade of PowerPoint slideshows. The modus operandi is however pretty typical, an email containing an attachment is sent. Content in the email is readied in such a way that it gains the immediate attention of the recipient and also maximises the chances of a response.

Apparently, the attached document is a PPSX file which is a file format associated with the PowerPoint. This format only offers playback of the slide but the edit options are locked out. In case the file is opened it will just display the following text, ‘CVE-2017-8570. (Another vulnerability for Microsoft Office.)’.

In reality, opening the file will trigger an exploit for another vulnerability named CVE-2017-0199 and then it will offload the malicious code via the PowerPoint animations. Eventually, a file called logo.doc will be downloaded. The document is made up of an XML file with JavaScript code which is used to run a PowerShell command and download the malicious program called ‘RATMAN.exe.’ which is a remote access Trojan referred to as .

The Trojan can record keystrokes, capture screenshots, record videos and also download other malware. In essence, the attacker will be in full control of your computer and can literally cause severe damage by stealing all your information including banking passwords. The use of PowerPoint file is a clever touch since the anti virus engine will be searching for RTF file.

All said and done, Microsoft has already patched the vulnerability way back in April and this is one of the reasons why we suggest folks to keep their PC’s updated. Yet another quintessential tip is to avoid downloading attachments from unknown sources, just don’t do it.

RELATED STORIES YOU NEED TO CHECK OUT:

  • Windows 10 virus removal tools to vanquish malware for good
  • 3 best antivirus software for preventing Petya/GoldenEye ransomware
  • The Hacked? app for Windows 10 detects breaches in your email account to keep you safe

If the advices above haven’t solved your issue, your PC may experience deeper Windows problems. We recommend downloading this PC Repair tool (rated Great on TrustPilot.com) to easily address them. After installation, simply click the Start Scan button and then press on Repair All.

Still having issues? Fix them with this tool:

SPONSORED

  • Cybersecuritymalwarepower point

Email *

Commenting as . Not you?

Comment