Facebook Twitter Instagram
    Wednesday, June 29
    Trending
    • “You’re Being Mad Disrespectful” Karen Loses It After Uber Driver Kicks Her Out For Eating In His Vehicle… Refuses To Leave Until She Gets A Refund!
    • DJ OHSO’s Bounce Dat Isn’t Your Typical Party
    • HBO Reveals Trailer For Season 2 Of Reality Competition THE BRIDGE — GeekTyrant
    • Top Gun: Maverick Facts That You Need To Know
    • Athletes call out “mental stress” of wearing Wimbledon uniform while on their period
    • Google Asks for Permission to Flood Inboxes With Campaign Spam
    • Scaling a Fintech Startup for the Greater Good
    • Is the World’s Computer Falling Behind?
    Facebook Twitter Instagram Pinterest VKontakte
    Swave Digest
    • Home
    • World News
    • Technology
      • Smartphones
      • Computers
      • Programming
      • Automobiles
    • Entertainment
      • Music
      • Anime
      • Movies
    • Sports
      • Football
      • Basketball
      • Tennis
    • Business
      • Crypto
      • Stocks
      • NFT
    • Lifestyle
      • Fashion
      • Health
      • Travel
    • Shop
    Swave Digest
    Home»Technology»Computers»Snake Keylogger Slithers Onto PCs With Malicious Word Docs In Sinister Malware Campaign
    Computers

    Snake Keylogger Slithers Onto PCs With Malicious Word Docs In Sinister Malware Campaign

    Swave DigestBy Swave DigestMay 23, 2022No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Snake Keylogger Slithers Onto PCs With Malicious Word Docs In Sinister Malware Campaign snake word
    Share
    Facebook Twitter LinkedIn Pinterest Email

    snake word

    It seems that every day a new malware threat rears its ugly head. Every once in a while though, the new threat is a version of an old threat. For example, PDFs as a method of malware delivery.

    That's what researchers at HP Wolf Security have recently found. A less common, but seemingly effective method of malware infection takes advantage of a number of tricks and tools to bypass detection both by detection software, and human interaction.

    Snake Keylogger Slithers Onto PCs With Malicious Word Docs In Sinister Malware Campaign 4415 829434Snake Keylogger Slithers Onto PCs With Malicious Word Docs In Sinister Malware Campaign 4415

    According to the report, the victim would receive an e-mail with a subject line of “Remittance Invoice,” which likely would look like it could be an invoice. The PDF format is often used for invoices, quotes, and other business interactions and files due to it's perceived increased security. Unfortunately in this case, the file is less than secure.

    faux file prompt
    PDF File Open Prompt with Phony File Name being opened.

    This file is less secure because it houses a hidden Microsoft Office document, typically a Word DOCX file. The embedded file has the name “has been verified.” When the user sees the prompt of Adobe PDF attempting to open the file the dialogue reads ,”The file ‘has been verified'.” as the first statement in the prompt, which the attacker hopes that the victim will just allow the system to bypass. Unfortunately, a bit of simple trickery which happens to work all too well on many users.

    Once the Word document is opened, and if macros are enabled, the Word document will then download and open an RTF (rich text format) file from a remote location and open it. The document, named “f_document_shp.doc” when opened this document attempts to exploit an old OLE vulnerability with the identifier CVE-2017-11882 that has actually long since been patched by Microsoft. That vulnerability allowed for arbitrary code execution, effectively allowing anyone who used it to run whatever code they wanted on infected systems. In this case, the snake keylogger usually gets installed, a way for the attacker to store keystrokes in order to store data.

    faux word doc
    Faux Word Document Used to Download Malware

    As with any malware threat, becoming infected can be rather serious. However, this particular threat has some pretty low chances of infection overall. In February Microsoft started rolling out updates to newer versions of Office that prevents macros from being loaded automatically without prompt. The security flaw that this end result exploits is already patched. So in order to actually become infected the user would need to be on an unpatched system, unwitting or unwary, open the PDF, allow the PDF to run, and bypass the macro prevention. Quite a lot of variables there, but, this malware was detected by HP Wolf this year, so it doesn't mean it can't happen.

    The best practices to protect yourself in this case are pretty simple. Be wary of any attachments, make sure your systems are up to date, make sure your software is up to date, and make sure your anti-malware or anti-virus software is up to date. Pretty straightforward, really.

    campaign computers docs keylogger malicious malware onto pcs sinister slithers snake with word
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Swave Digest
    • Website
    • Twitter
    • Pinterest

    Related Posts

    Google Asks for Permission to Flood Inboxes With Campaign Spam

    June 29, 2022

    The Maldives is Combatting Rising Sea Levels with Auto-Responsive Floating City

    June 29, 2022

    Goran Dragic close to deal with Mavericks?

    June 29, 2022

    Nothing Company may partner with Reliance Digital for Phone 1’s retail sales in India- Technology News, Firstpost

    June 29, 2022
    Add A Comment

    Leave A Reply Cancel Reply

    Twitter Instagram Pinterest
    • Home
    • Privacy Policy
    • Terms & Conditions
    • Contact Us
    © 2022 Swave Digest. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.

    Posting....
    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
    In case of sale of your personal information, you may opt out by using the link Do not sell my personal information.
    Cookie settingsACCEPT
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    Save & Accept