in

Hackers Exploiting Microsoft Office Vulnerabilities Increased This Year.

The number of users attacked by malicious Microsoft Office documents is up 400%, compared to the same period of 2017

Software exploiting Microsoft Office vulnerabilities leads the list of cyber incidents for the first quarter of this year.

The number of users attacked by malicious Microsoft Office documents is up 400%, compared to the same period of 2017, according to the latest Kaspersky Lab report.

Also, such attacks based on software vulnerabilities are powerful because they do not require any further interaction with the user and may even automatically infect their malicious code.

That's why both everyday cybercriminals, as well as organized hacker groups often supported by nation-states, are happy to use it.

This year the number of such attacks has increased considerably. These sneaky malware variations are mainly aimed at the most popular document editing program, Microsoft Office.

Experts identified at least a dozen malicious code last year that have exploited Microsoft Office vulnerabilities, which is a lot more the Adobe Flash player is responsible for.

Soon as the cybercriminals are aware of a vulnerability, they create a malicious code that can be used immediately. The delivery method usually is a good old fashion spear-phishing attack. This is an increasingly widespread form of phishing attacks by which data collected from the target can be used to launch a more effective assault. Phishing is designed to trick victims to access a malicious attachment or link that could hurt the network or infect devices.

The main problem is that users often neglect to install software updates and patches. While vendors are usually patching vulnerabilities, users don't always fix them right away, which can lead to a massive cyber-attack wave as hackers become aware of these security holes.

The single most important thing to avoid this is to update your software and devices and make sure your security software is working correctly.

Until next time, stay safe…

What do you think?

15 Points
Upvote Downvote

Written by Staff

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

spyware and ransomware concept with digital glitch effect

New Ransomware Pretends You Are Under Investigation by The Government.

password security log in technology

Insiders Pose The Greatest Risk To Company’s Cyber Security