An email spam campaign distributed malicious Word documents that exploited an unpatched flaw to install the Dridex banking trojan The gang behind the Dridex computer trojan has adopted an unpatched Microsoft Word exploit and used it to target millions of users.The exploit’s existence was revealed Friday by security researchers from antivirus vendor McAfee, but targeted attacks using it have been happening since January. After McAfee’s limited public disclosure, researchers from FireEye confirmed having tracked the attacks for several weeks as well.The exploit takes advantage of a logic bug in the Windows Object Linking and Embedding (OLE) feature of Microsoft Office. It allows attackers to embed malicious code inside of Microsoft Word documents, with the code automatically executed when those files are opened.Even though security researchers have not disclosed specific details about the vulnerability, it seems that mere knowledge of the exploit’s existence was enough for cybercriminals to track it down and reverse engineer it. On Monday, the Dridex gang launched an email spam campaign that distributed malicious documents exploiting this flaw to millions of users, primarily within organizations in Australia, security vendor Proofpoint reported.“This represents a significant level of agility and innovation for Dridex actors who have primarily relied on macro-laden documents attached to emails,” the Proofpoint researchers said in a blog post. “This is the first campaign we have observed that leverages the newly disclosed Microsoft zero-day.” Until now, the Dridex campaigns have relied on rogue documents with malicious macros that required user interaction to actually execute. The new Word exploit makes their infection campaign much more dangerous and more likely to succeed.The use of previously undisclosed, zero-day exploits is typically associated with cyberespionage — targeted attacks against a limited number of victims. This is because such exploits are valuable resources, and attackers try to benefit from them for as long as possible. Using zero-day exploits in widespread campaigns would significantly increase the chance of security companies discovering them and vendors patching the flaws.Dridex first appeared back in 2014 and is currently one of the most prevalent computer trojans targeting online banking accounts. It can steal login credentials and inject content directly into banking websites opened on infected machines.Microsoft plans to patch the vulnerability exploited in this attack on Tuesday, a Microsoft representative said in an emailed statement. “Meanwhile, we encourage customers to practice safe computing habits online, including exercising caution before opening unknown files and not downloading content from untrusted sources to avoid this type of issue.”Security vendors have also recommended that Microsoft Word users enable the Protected View mode, which can block this exploit from working.Head over to Facebook to add your comments. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe