Researchers have reported that on Friday, May 27th, they found a zero-day vulnerability using Microsoft Office. CVE-2022-30190 or Follina had the cybercrime industry spending the weekend figuring out how to exploit this vulnerability.
Fake Word documents are sent as email attachments. These .doc and .rtf email attachments are not documents at all. When the user opens the attachment, it will infect the user's device using an 'ms-msdt' protocol scheme. Then it remotely executes malicious code with the intent of extracting protected data.
Microsoft is reporting that this threat is impacting all Microsoft-supported versions of Office. The best thing you can do is not open attachments from unknown senders.
Interesting maldoc was submitted from Belarus. It uses Word's external link to load the HTML and uses the "ms-msdt" scheme to execute PowerShell code.https://t.co/hTdAfHOUx3 pic.twitter.com/rVSb02ZTwt
— nao_sec (@nao_sec) May 27, 2022
Please share this information with your organization and make sure they read it. Be suspicious of any emails that you are not expecting. If you are expecting an email, verify that it is coming from an address you trust.
Please don't open it. Use email reporting tools to inform your IT or cybersecurity team immediately.
The centralized services team at DKBinnovative has thoroughly tested and implemented a workaround to protect our managed service and managed security service clients until Microsoft releases a patch for this vulnerability. Keeping our client's data secure is our first priority so that they can focus on what they do best.
Update: Security researchers have discovered one of Microsoft's latest patches seems to resolve the Follina vulnerability but has yet to make any official announcements. For this reason, DKBinnovative is keeping mitigations in place until further notice.