The attack appears to have occurred in January, before Microsoft became aware of the flaw A previously unknown Microsoft Office vulnerability was recently used to deliver spyware to Russian-speaking targets, in a possible case of cyberespionage.Security firm FireEye noticed the intrusion attempt, which taps a critical software flaw that hackers are using to craft malicious Microsoft Word documents.On Wednesday, FireEye said it uncovered one attack that weaponized a Russian military training manual. Once opened, the malicious document will deliver FinSpy, a surveillance software that’s been marketed to governments.It’s unclear who the document was targeting. However, it appears to have been published in the Donetsk People’s Republic, a breakaway region in Ukraine that’s received Russian support. FinSpy, also known as FinFisher, is developed by a subsidiary of Gamma Group, a European firm that specializes in surveillance and monitoring equipment. Thirty-three governments have been suspected of using the firm’s spyware, according to a 2015 investigation from Citizen Lab. FireEye said the malicious Russian training manual can download additional malware payloads to the victim’s computer, along with another fake document claiming to be a Russian decree approving a forest management plan. The attack appears to have occurred this January, months before Microsoft became aware of the vulnerability. Given that Gamma Group probably has a long list of government customers, FireEye suspects other parties may have hacked targets in the same way, using FinSpy.It’s also possible that knowledge about the Microsoft vulnerability may have been circulated in the hacking community.In March, a separate attack was found using the vulnerability but instead to deliver malware that’s been involved in financial crimes.However, FireEye said that both this attack and the intrusion attempt against Russian-speaking targets share similar code. This suggests different hacking groups may have gotten information about Microsoft vulnerability from the same source.Fortunately, Microsoft on Tuesday issued a patch to fix the flaw. Security researchers warn that opening email attachments remain a major source of malware infections. Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe