Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Old Microsoft Office Exploits Still Wreaking Havoc

    Written by

    Sean Michael Kerner
    Published May 3, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      New research published May 3 by SophosLabs reveals that even while attackers continue to design custom-tailored lures to exploit users, the inconvenient truth is that the most popular vulnerabilities are issues that have been patched years ago.

      Instead of just sending random emails, SophosLabs has found an increasing use of what it refers to as “Designer” cyber-threats.

      “The details are correct [language, grammar, etc.], leading to far higher victim yields,” Chester Wisniewski, senior security adviser at Sophos, told eWEEK. “Some have gone as far as to combine information from data breaches like victims’ home addresses.”

      Going a step further, SophosLabs is seeing increased use of targeted attacks that are specifically localized for the victims. That is, attackers are using specific types of malware depending on where victims are located. The idea of a targeted attack—spear phishing emails, in particular—is not a new one, though it has apparently undergone an evolution in recent months.

      “In the past, most localization focused primarily on banking malware, and even then much of it was spread far more widely than was effective at finding the right victims,” Wisniewski said.

      For example, he noted that Bank of America spam targeting Australians wasn’t uncommon, even though it wasn’t an attack lure that should appeal to Australians.

      “Now exploit kit retailers want the maximum dollar return per victim regardless of location,” Wisniewski said. “It isn’t entirely new, just refined and getting more common and successful as they figure out better ways to target us.”

      SophosLabs also specifically looked at attack exploits related to Microsoft Office documents during the fourth quarter of 2015. According to the analysis, the CVE-2012-0158 Office exploit was used in approximately 48 percent of reported incidents. Although CVE-2012-0158 was patched by Microsoft more than three years ago, for various reasons it remains very popular and is exploited regularly.

      “One reason is that we’re terrible at patching,” Wisniewski said.

      Failure to patch is a trend that other vendors have observed this year, including the recent Verizon 2016 Data Breach Investigations Report (DBIR). According to the DBIR, 85 percent of all successful exploits in the last year can be attributed to 10 already patched vulnerabilities. In some cases, the patches have been available for years.

      CVE-2012-0158, in particular, remains popular, simply because it continues to work, according to Wisniewski. He noted that creating a reliable exploit that is compatible with a wide variety of PCs is difficult, and CVE-2012-0158 is a solidly reliable exploit against unpatched Office. Simply opening the malicious document leads to remote code execution.

      “It is slowly losing ground to newer exploits, but has been used by many groups without the skill to use newer and more complicated exploits,” Wisniewski said.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×