Elephant0991

joined 2 years ago
[–] [email protected] 2 points 2 years ago

That's a wonderful story. Thank you for sharing.

[–] [email protected] 40 points 2 years ago (1 children)

You definitely don't want this stuff to escape into the atmosphere.

[–] [email protected] 2 points 2 years ago

Matching atmosphere. Like the floating door; you can be pushed right from inside the house onto the lawn.

[–] [email protected] 3 points 2 years ago

Practically true.

[–] [email protected] 3 points 2 years ago

That's like, real estate inspection.

[–] [email protected] 6 points 2 years ago

When I forgot part of my my old password, I came up with a list of words that I possibly could have come up with and tried those. I eventually found it even if I was panicky the whole time. If I were you, I would list the words and try them in the order of probabilities.

Un/Fortunately, BW is implemented to rate-limit password brute-forcing. I feel you about your CAPTCHA hell, and I hate their surreal sunflower CAPTCHA (maybe to make it as repulsive as possible to the hackers?).

[–] [email protected] 1 points 2 years ago

Didn't his admin approve the Operation Warp Speed thingy?

[–] [email protected] 2 points 2 years ago

That's probably not just for debris protection; there's also bat shit!

[–] [email protected] 5 points 2 years ago

The show must go on.

[–] [email protected] 13 points 2 years ago* (last edited 2 years ago)

True.

  • Automatic patch => automatic installation of malware

  • Manual patch => unpatched vulnerabilities

Screwed either way.

 

Summary

  • A zero-day vulnerability (CVE-2023-36884) is being exploited in the wild to target those with an interest in Ukraine.
  • The vulnerability allows attackers to execute malicious code on a victim's computer by tricking them into opening a specially crafted Microsoft Office document.
  • The attacks are being carried out by a group known as Storm-0978, which is also known for distributing trojanized versions of popular software and launching ransomware attacks.
  • Microsoft recommends that organizations use Microsoft Defender for Office 365 or the Block all Office applications from creating child processes attack surface reduction rule to protect themselves from this vulnerability.
  • Organizations can also consider blocking outbound SMB traffic.

Other details

  • The phishing campaign that is being used to deliver the malicious Office documents is targeting defense and government entities in Europe and North America.
  • The bait used in the phishing emails is related to the Ukrainian World Congress, a non-profit organization of Ukrainian public organizations in diaspora.
  • Once a victim opens the malicious Office document, the attacker can execute arbitrary code on their computer.
  • The attacker can then use this code to steal data, install malware, or take control of the victim's computer.

Microsoft's CVE-2023-36884 specific recommendations

  • Customers who use Microsoft Defender for Office 365 are protected from attachments that attempt to exploit CVE-2023-36884.
  • In current attack chains, the use of the Block all Office applications from creating child processes attack surface reduction rule prevents the vulnerability from being exploited
  • Organizations who cannot take advantage of these protections can set the FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION registry key to avoid exploitation. Please note that while these registry settings would mitigate exploitation of this issue, it could affect regular functionality for certain use cases related to these applications.

Other recommendation:

  • You could also consider blocking outbound SMB traffic.
view more: ‹ prev next ›