Monday, April 28, 2025
Monday, April 28, 2025
- Advertisement -

Number of exploits for vulnerabilities in Microsoft Office suite increases 

Kaspersky finds eight times more users attacked via an old Microsoft Office vulnerability

Must Read

- Advertisement -
- Advertisement -
  • Accounts for 82% of the total number of exploits across different platforms in second quarter.

The number of exploits for vulnerabilities in the Microsoft Office suite increased in the second quarter of this year, accounting for 82 per cent of the total number of exploits across different platforms, a Kaspersky report showed.

In the first quarter of this year, vulnerabilities in Office suite accounted for 78.50 per cent.

Old versions of applications remain the main targets for attackers, with almost 547,000 users in total being affected through corresponding vulnerabilities in the last quarter.

Moreover, the number of users affected by the Microsoft MSHTML Remote Code Execution vulnerability, which was previously spotted in targeted attacks, skyrocketed eight times.

Social engineering techniques

The zero-day vulnerability in Internet Explorer’s engine MSHTML was first reported in September 2021.

The engine is a system component used by Microsoft Office applications to handle web content. When exploited, it enables the remote execution of malicious code on victims’ computers.

 “Since the vulnerability is quite easy to use, we expect an increase in its exploitation,”  Alexander Kolesnikov, malware analyst at Kaspersky, said in a statement.

Moreover, he said that criminals craft malicious documents and convince their victims to open them through social engineering techniques.

“The Microsoft Office application then downloads and executes a malicious script. To be on the safe side, it is vital to install the vendor’s patch, use security solutions capable of detecting vulnerability exploitation, and to keep employees aware of modern cyberthreats.”

Related posts:

- Advertisement -

Latest News

A security researcher exposes critical iOS vulnerability

The vulnerability, residing within the Darwin notifications system, can remotely sabotage and effectively brick iPhones with a mere single line of code.

du Pay hits half a million app downloads and AED500m in transactions

It includes international money transfer, local transfers, bill payments, card transactions, peer-to-peer (P2P) transfers

7 best practices for effective Machine Identity Management

Productive machine identity management is essential to security, confidence, and indeed to the protection of confidential information of an organisation
- Advertisement -
- Advertisement -

More Articles

- Advertisement -