Watch out for this dangerous new Microsoft Word scam, Office users warned

Word files can trigger remote code execution

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

Cybercriminals have found a new hole inMicrosoft Worddocuments that allow them to distributemalware, researchers are saying.

Discovered by cybersecurity expert Kevin Beaumont, and dubbed “Follina”, the hole leverages a Windows utility called msdt.exe, designed to run different troubleshooter packs on Windows.

According to the report, when the victim downloads the weaponized Word file, they don’t even need to run it, previewing it in Windows Explorer is enough for the tool to be abused (it has to be an RTF file, though).

Share your thoughts on Cybersecurity and get a free copy of the Hacker’s Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at theend of this surveyto get the bookazine, worth $10.99/£10.99.

By abusing this utility, the attackers are able to tell the target endpoint to call an HTML file, from a remote URL. The attackers have chosen the xmlformats[.]com domain, probably trying to hide behind the similar-looking, albeit legitimate, openxmlformats.org domain used in most Word documents, the researchers are suggesting.

Acknowledging the threat

Acknowledging the threat

The HTML file holds plenty of “junk”, which obfuscates its true purpose - a script that downloads and executes a payload.

The report says almost nothing about the actual payload, so it’s hard to determine the threat actor’s endgame. It does say that the complete chain of events related to the publicized samples is not yet known.

Following the publication of the findings,Microsofthas acknowledged the threat, saying a remote code execution vulnerability exists “when MSDT is called using the URL protocol from a calling application such as Word.”

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

“An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights.”

Attackers have found a way to bypass a crucial Microsoft Office patch>Beware - that Windows 11 document is probably a scam>What is a zero-click attack, and what can you do about them?

While someantivirussoftware, such as Sophos, are already capable of spotting this attack, Micorosft has also released a mitigation method, which includes disabling the MSDT URL protocol.

While this will prevent troubleshooters from being launched as links, they can still be accessed using the Get Help application, and in system settings. To activate this workaround, admins need to do the following:

Run Command Prompt as Administrator.

To back up the registry key, execute the command “reg export HKEY_CLASSES_ROOT\ms-msdt filename“

Execute the command “reg delete HKEY_CLASSES_ROOT\ms-msdt /f”.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Dangerous Android banking malware looks to trick victims with fake money transfers

Sophos Firewall hack on government network used an all-new custom malware

Don’t wait until Black Friday, this year’s best Nintendo Switch bundles are on sale now