{"id":515,"date":"2017-04-10T13:03:01","date_gmt":"2017-04-10T20:03:01","guid":{"rendered":"http:\/\/dshsolutions.com\/wordpress\/?p=515"},"modified":"2017-04-10T13:03:01","modified_gmt":"2017-04-10T20:03:01","slug":"beware-of-an-unpatched-microsoft-word-0-day-flaw-being-exploited-in-the-wild","status":"publish","type":"post","link":"https:\/\/dshsolutions.com\/wordpress\/beware-of-an-unpatched-microsoft-word-0-day-flaw-being-exploited-in-the-wild\/","title":{"rendered":"Beware of an Unpatched Microsoft Word 0-Day Flaw being Exploited in the Wild"},"content":{"rendered":"<p>As a general rule, you should never open a file from anyone that you aren&#8217;t expecting. \u00a0If your best friend or family member sends you a file you didn&#8217;t ask for, email them and make sure they sent it. This exploit bypasses the disabled macro settings and is very devious.<\/p>\n<blockquote><p>According to researchers, this zero-day attack is severe as it gives the attackers the power to bypass most exploit mitigations developed by Microsoft, and unlike past <a href=\"http:\/\/thehackernews.com\/2016\/06\/ransomware-msoffice.html\" target=\"_blank\" rel=\"noopener\">Word exploits<\/a> seen in the wild, it does not require victims to enable Macros.<\/p>\n<p>Due to these capabilities, this newly discovered attack works on all Windows operating systems even against Windows 10, which is believed to be Microsoft&#8217;s most secure operating system to date.<\/p>\n<p>Besides this, the exploit displays a decoy Word document for the victims to see before terminating in order to hide any sign of the attack.<\/p><\/blockquote>\n<blockquote><p><a href=\"https:\/\/thehackernews.com\/2017\/04\/microsoft-word-zero-day.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Security+Blog%29&amp;_m=3n.009a.1468.qm0ao08yu9.vfx\">Read the entire article&#8230;<\/a><\/p><\/blockquote>\n<p>Source: <em><a href=\"https:\/\/thehackernews.com\/2017\/04\/microsoft-word-zero-day.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Security+Blog%29&amp;_m=3n.009a.1468.qm0ao08yu9.vfx\">Beware of an Unpatched Microsoft Word 0-Day Flaw being Exploited in the Wild<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As a general rule, you should never open a file from anyone that you aren&#8217;t expecting. \u00a0If your best friend or family member sends you a file you didn&#8217;t ask for, email them and make sure they sent it. This exploit bypasses the disabled macro settings and is very devious. According to researchers, this zero-day [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,5,8],"tags":[],"class_list":["post-515","post","type-post","status-publish","format-standard","hentry","category-office-windows-powerpoint","category-security-2","category-software"],"_links":{"self":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/comments?post=515"}],"version-history":[{"count":0,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/515\/revisions"}],"wp:attachment":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/media?parent=515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/categories?post=515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/tags?post=515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}