- Accounts for 82% of the total number of exploits across different platforms in second quarter.
The number of exploits for vulnerabilities in the Microsoft Office suite increased in the second quarter of this year, accounting for 82 per cent of the total number of exploits across different platforms, a Kaspersky report showed.
In the first quarter of this year, vulnerabilities in Office suite accounted for 78.50 per cent.
Old versions of applications remain the main targets for attackers, with almost 547,000 users in total being affected through corresponding vulnerabilities in the last quarter.
Moreover, the number of users affected by the Microsoft MSHTML Remote Code Execution vulnerability, which was previously spotted in targeted attacks, skyrocketed eight times.
Social engineering techniques
The zero-day vulnerability in Internet Explorer’s engine MSHTML was first reported in September 2021.
The engine is a system component used by Microsoft Office applications to handle web content. When exploited, it enables the remote execution of malicious code on victims’ computers.
“Since the vulnerability is quite easy to use, we expect an increase in its exploitation,” Alexander Kolesnikov, malware analyst at Kaspersky, said in a statement.
Moreover, he said that criminals craft malicious documents and convince their victims to open them through social engineering techniques.
“The Microsoft Office application then downloads and executes a malicious script. To be on the safe side, it is vital to install the vendor’s patch, use security solutions capable of detecting vulnerability exploitation, and to keep employees aware of modern cyberthreats.”
Related posts:
- Steps to prevent identity-based attacks in cybersecurity
- Oxeye discovers smuggling vulnerability in GoLang-based applications
- The need for predictive tools to combat complex security threats is greater than ever