In recent developments within the cybersecurity landscape, a noteworthy malware campaign has emerged, capitalizing on a previously reported vulnerability in Microsoft Office. This particular flaw, identified as CVE-2017-0199, relates to the Windows Object Linking and Embedding (OLE) interface. Although Microsoft issued a patch addressing this vulnerability earlier this year, threat actors continue to exploit it in novel ways.

The most recent campaign has been identified by researchers at Trend Micro, who observed that attackers are now concealing malicious payloads within specially crafted PowerPoint (PPSX) presentation files. This represents a notable shift in tactics, as prior iterations primarily used Microsoft Word documents. The target audience for these attacks appears to be organizations within the electronics manufacturing sector, with attackers employing spear-phishing techniques to deliver their payload.

The infiltration process commences with a seemingly legitimate email attachment presenting itself as shipping information related to an order request. Upon execution, the PPSX file calls an encoded XML component that prompts the download of a separate “logo.doc” file from a remote server. Following this, the infected document triggers the CVE-2017-0199 vulnerability, leading to the installation of RATMAN.exe on the compromised system.

RATMAN.exe represents a Trojanized variant of the legitimate Remcos Remote Control tool, which affords attackers extensive remote access capabilities. Once installed, this malware allows adversaries to control infected systems from a command-and-control server, facilitating various malicious activities such as data exfiltration, screen capture, and keylogging.

As the use of infected PowerPoint files becomes increasingly common, traditional detection methods centered around Rich Text Files (.RTF) may fail to identify these new attack vectors, highlighting a significant evolution in malware distribution strategies. Through employing file types that evade common antivirus detection mechanisms, attackers are increasing their chances of successful breaches.

For businesses, the implications extend beyond immediate system vulnerabilities. The ongoing exploitation of such a critical flaw underscores the necessity of applying security patches promptly. Organizations are urged to remain vigilant and consistently update all software in alignment with vendor releases to mitigate the risks associated with vulnerabilities like CVE-2017-0199.

This incident primarily targets businesses based in the United States, particularly those involved in electronics manufacturing. Within the framework of the MITRE ATT&CK Matrix, techniques associated with this attack include Initial Access, particularly through Phishing, Persistence through the malicious PowerPoint file, and possibly Remote Access for the execution of the RATMAN Trojan.

In conclusion, as cyber threats continue to evolve, organizations must prioritize a proactive approach to cybersecurity. Diligently monitoring for signs of vulnerabilities and ensuring systems are up-to-date can significantly reduce the risk of falling victim to sophisticated attacks like this one.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.