
- #OPENOFFICE BUG ALLOWS HACKERS TO SIGNED INSTALL#
- #OPENOFFICE BUG ALLOWS HACKERS TO SIGNED PRO#
- #OPENOFFICE BUG ALLOWS HACKERS TO SIGNED SOFTWARE#
#OPENOFFICE BUG ALLOWS HACKERS TO SIGNED SOFTWARE#
Make sure all Windows machines have up-to-date antivirus software installed.Better yet, insist that coworkers, customers, and collaborators share documents via a cloud service like Google Cloud or OneDrive. Never open a Microsoft Office attachment from an unfamiliar source.Qihoo 360 said it’s urgently promoting the release of a patch, but until Microsoft acknowledges the exploit through anything more than a canned response it’s up to users and security professionals to take steps to avoid infection: It’s an advanced threat, and Microsoft has yet to issue a formal response. The later phases of the attack use a public user account control (UAC) bypass technique, file steganography, memory reflection loading, and fileless execution.
#OPENOFFICE BUG ALLOWS HACKERS TO SIGNED PRO#
SEE: Securing Windows policy (Tech Pro Research)

What Qihoo 360 does mention is how the attack actually functions: A malicious Microsoft Office document, when opened, connects to a remote server and silently downloads and installs exploit code and malicious payloads. It also doesn’t reveal which “ known APT actor” or nation-state sponsors may be behind the attack, leaving a lot of questions unanswered. Qihoo 360’s report is scant on details–it doesn’t say what the actual zero-day exploit is and doesn’t mention the particular software being delivered.
#OPENOFFICE BUG ALLOWS HACKERS TO SIGNED INSTALL#
Once someone is infected, Qihoo 360 said, attackers can install backdoor Trojans or even gain complete control over the machine. The zero day requires a potential victim to open a malicious Microsoft Office document that contains a link to a website designed to deliver a malware payload, which is a common way for attackers to infect victims. Security incident response: Critical steps for cyberattack recovery (TechRepublic Premium) The 10 best antivirus products you should consider for your businessĨ enterprise password managers and the companies that will love them Qihoo’s 360 Security Center said the zero day, which it calls a “double kill” due to targeting Internet Explorer and any other apps that use the IE kernel, is already being used by an advanced persistent threat (APT), which are often government-sponsored.

