Microsoft Macros Remain Top Vector for Malware Delivery
#1
Quote:Attacks using malicious Microsoft macros, always a popular method for compromising target machines, are more virulent than ever, accounting for 45 percent of all delivery mechanisms analyzed in August.

Just behind this tried-and-true method lies the Microsoft Office Memory Corruption Vulnerability (CVE-2017-11882), a bug that allows the attacker to perform arbitrary code-execution. In a report released Thursday from Cofense intelligence, it was shown to responsible for 37 percent of malware delivery last month, despite having been patched since last November.

The remaining 18 percent of delivery mechanisms spotted in August is mainly made up of batch scripts, PowerShell scripts and downloaders for Microsoft Windows scripting component (WSC) files (often seen in games). These all trail far, far behind the two leading vectors, with less than 6 percent of attacks each.

Source: https://threatpost.com/threatlist-micros...ry/137428/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AV-Comparatives: EDR-Detection-Validatio...
EDR-Detection-Vali...harlan4096 — 11:17
Rufus 4.8
Rufus 4.8 (stable)...harlan4096 — 11:15
Antivirus Removal Tool 2025.06 (v.1)
Hello everyone, ...harlan4096 — 11:13
Brave 1.79.123
Release Channel 1....harlan4096 — 11:11
Opera 119.0.5497.88
Hello there! We...harlan4096 — 11:10

[-]
Birthdays
Today's Birthdays
avatar (39)Julioagopy
avatar (49)aolaupitt2558
Upcoming Birthdays
avatar (38)Tedscolo
avatar (45)brakasig
avatar (44)JamesReshy
avatar (46)Francisemefe
avatar (39)leoniDup
avatar (38)Patrizaancem
avatar (38)biobdam
avatar (39)storoBox
avatar (47)kinotHeemn
avatar (38)Ceballos1976
avatar (39)efynu
avatar (31)horancos

[-]
Online Staff
There are no staff members currently online.

>