Infostealer Embedded in a Word Document, (Thu, May 4th)

When attackers design malicious documents, one of their challenges is to make the potential victim confident to perform dangerous actions: click on a link, disable a security feature, etc. The best example is probably VBA macros in Microsoft Office documents. Disabled by default, the attacker must make the user confident to enable them by clicking on the “yellow ribbon” on top of the document.

When attackers design malicious documents, one of their challenges is to make the potential victim confident to perform dangerous actions: click on a link, disable a security feature, etc. The best example is probably VBA macros in Microsoft Office documents. Disabled by default, the attacker must make the user confident to enable them by clicking on the “yellow ribbon” on top of the document.


Print Share Comment Cite Upload Translate
APA
() » Infostealer Embedded in a Word Document, (Thu, May 4th). Retrieved from https://www.truth.cx/2023/05/04/infostealer-embedded-in-a-word-document-thu-may-4th/.
MLA
" » Infostealer Embedded in a Word Document, (Thu, May 4th)." - , https://www.truth.cx/2023/05/04/infostealer-embedded-in-a-word-document-thu-may-4th/
HARVARD
» Infostealer Embedded in a Word Document, (Thu, May 4th)., viewed ,
VANCOUVER
- » Infostealer Embedded in a Word Document, (Thu, May 4th). [Internet]. [Accessed ]. Available from: https://www.truth.cx/2023/05/04/infostealer-embedded-in-a-word-document-thu-may-4th/
CHICAGO
" » Infostealer Embedded in a Word Document, (Thu, May 4th)." - Accessed . https://www.truth.cx/2023/05/04/infostealer-embedded-in-a-word-document-thu-may-4th/
IEEE
" » Infostealer Embedded in a Word Document, (Thu, May 4th)." [Online]. Available: https://www.truth.cx/2023/05/04/infostealer-embedded-in-a-word-document-thu-may-4th/. [Accessed: ]
Select a language: