How Hackers Are Using Corrupted Word Docs To Cleverly Evade Antivirus Tools

Security researchers at Any.Run have uncovered a sophisticated zero-day attack currently employed by threat actors to outsmart the detection tools relied upon by security professionals. This innovative technique effectively evades antivirus software, obstructs uploads to sandboxes, and circumvents Outlook’s spam filters, enabling malicious emails to infiltrate users’ inboxes. In this relentless game of cat and mouse between cyber attackers and defenders, the stakes continue to rise.

Mechanism of Attack

Threat actors exploit deliberately corrupted files to bypass various security mechanisms. This tactic renders the files exceedingly difficult to detect, allowing them to slip past malware detection systems. Researchers have pointed out that while these files function seamlessly within the operating system, they often remain undetected by most security solutions due to inadequate procedures applied to their specific file types.

The delivery method for these files is equally cunning. They are sent to potential victims via email, masquerading as communications from a company’s payroll or human resources department. When a victim attempts to open the file, software like Microsoft Word may initiate a restoration process, prompting the user to permit this action. Once the file is allegedly “fixed,” it redirects the user to a site designed to steal credentials, potentially compromising an organization’s network.

Implications for Security Teams

This combination of social engineering and malware poses a significant threat that security teams must address with vigilance. The ease with which this attack can bypass detection tools, coupled with the use of seemingly legitimate communications, amplifies its potency. Once a user engages with the “fixed” file, the risk of credential theft escalates, making this a formidable weapon for attackers.

Organizations that depend heavily on detection tools to prevent such emails from reaching their employees are particularly vulnerable. As this threat landscape evolves, it becomes increasingly crucial for security teams to remain alert and adapt their strategies to counteract these emerging tactics.

Tech Optimizer
How Hackers Are Using Corrupted Word Docs To Cleverly Evade Antivirus Tools