Skip to content
Naked Security Naked Security

Attackers using a Word zero-day to spread malware

Microsoft expected to patch the vulnerability later today, but meanwhile, here's what we know and what you can do to protect yourself

Attackers are using a previously undisclosed security hole in Microsoft Word to install a variety of malware on victims’ computers. Microsoft knows about the zero-day and is expected to patch it later today. As we await that security update, here’s a review of the bug and the available defenses.

In its investigation, SophosLabs determined that exploits against this vulnerability have been happening for some time. SophosLabs principal researcher Gábor Szappanos said:

This vulnerability has been used for months in targeted attacks. Most of the activity went on in March-April 2017, but the first sample we could locate dates back to November 2016.

What we know so far

The vulnerability is triggered by opening a document that provokes a benign-looking download warning, followed by a download from a booby-trapped server that sends a document of a more dangerous sort. 

In this case, the booby-trapped server sends out a compiled HTML file with an embedded program script. Word accepts and runs the script without producing the warning you would expect to see.

It affects all current Office versions used on every Windows operating system, including the latest Office 2016 running on Windows 10. Attacks do not rely on enabled macros, so no warning for macro-laden documents will appear. The Dridex banking Trojan is among the malware being used in some of the exploits.

Details of the vulnerability were first released by McAfee and FireEye over the weekend. It’s the latest in a long line of bugs attackers can take advantage of through maliciously constructed files.

Naked Security’s Paul Ducklin reviewed SophosLab’s findings and said of the attack technique:

It’s a bit like wearing overalls to get into a fancy dinner party venue by blagging your way in the front door as the plumber come to do a quick check for a possible leak in the Gents. Once inside, you strip off to the dinner jacket you’re wearing under the overalls, so you now pass muster as a dinner guest, with everyone assuming you showed your invitation at the door already. Dressed up properly in the DJ wouldn’t have got you in through the lobby at the start, because of no invitation, and the overalls wouldn’t have got you into the dining room, because of violating the dress code. So you wear the right clothes at the right moment and subvert both places where you would otherwise get spotted.

This attack does depend on the user accepting a “load remote content” warning. Without that, the external content will not be pulled.

Additional defensive measures

As mentioned, Microsoft will release a patch for the vulnerability. Meantime, Sophos detects the first stage RTF downloader used in these exploits as Troj/DocDrop-TJ, and the second stage HTA code as Troj/DocDrop-SU. Sophos customers are protected.

Additional advice, for this threat and many others, include the following:

  • If you receive a Word document by email and don’t know the person who sent it, DON’T OPEN IT.
  •  It appears that attacks seen in the wild thus far can’t bypass the Office Protected View, which means enabling it may provide some extra protection.
  • Watch for Microsoft’s patch, and – once it’s released – install immediately.
  • Use an anti-virus with an on-access scanner (also known as real-time protection). This can help you block malware of this type in a multi-layered defense, for example, by stopping the initial booby-trapped word file, preventing the Dridex download, blocking the downloaded malware from running, and finding and killing off the Dridex malware in memory.
  • Consider stricter email gateway settings. Some staff are more exposed to malware-sending crooks than others (such as the order processing department), and may benefit from more stringent precautions, rather than being inconvenienced by them.
  • Never turn off security features because an email or document says so. Documents such as invoices, courier advisories and job applications should be legible without macros enabled.


8 Comments

Would be great if you could always open Word and Excel files with the viewers but as far as I am aware you have to change the default behaviour of Windows to do it. That would just annoy the living daylights out of everyone trying to edit none attachment Word and Excel files and would most likely get any sys-admin hung if they tried it. Unless there is a way I haven’t discovered yet of doing this?

Has anyone identified this particular patch yet? I’m looking at the official Microsoft Security Update Summary for April and I don’t see a patch specifically for Word. Which patch do I need to deploy to close this zero day hole?

I’m looking for it myself, Steve. Once it appears, we’ll put an update on site.

Ah, here it is. I’m writing the story now: https://support.microsoft.com/en-us/help/3141538/description-of-the-security-update-for-office-2010-april-11-2017

Thanks for the update Bill (pun fully intended!) but the update you referenced is just for Office 2010. This vulnerability and the related patch are supposed to apply to all current Office versions used on every Windows operating system, including the latest Office 2016. Where are the rest of the updates? :-)

I did notice that when writing this: https://nakedsecurity.sophos.com/2017/04/11/microsoft-patches-word-zero-day-booby-trap-exploit/

I’m hunting for clarity on that and will update the new story as I get more detail.

I must say, it seems the new MS bulletin format is less detailed while being harder to digest, if that’s even possible. I welcome your perspective on that. :-)

Many of us use the LibreOffice package either on WIndows, Linux or Apple. Can we assume that this expoloit (and the others) are not applicable to that package? I know that clicking on any unknown link in an email is not a good thing, but the extra security provided by using libreOffice (or Open Office) would be welocomed.

This exploit seems to be part of Windows OLE (object linking and embedding), where the “plumber’s overalls” are the not-so-serious-looking external content warning provoked by OLE, and the “dinner jacket” is what happens when the external content is downloaded. (If you look at the content of the downloaded file you’ll think it’s an RTF file but if you look at the HTTP headers in the reply from the remote server, you’ll be told it’s an HTA file.)

So it may be possible to exploit it without Word. I haven’t looked at this one myself, so I can’t tell you for sure either way. But the fact that the update from Microsoft seems to imply that this is an OLE bug and not an Office bug makes me think that…

…installing the patch is the best thing to do. (If you’re on Linux or macOS, you aren’t affected by this one.)

Comments are closed.

Subscribe to get the latest updates in your inbox.
Which categories are you interested in?