Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

How hackers are using corrupted Microsoft Office files to fool everyone

The malicious files used in this campaign are designed to exploit the recovery functionalities of Microsoft Word and WinRAR

byKerem Gülen
December 4, 2024
in News, Cybersecurity
Home News

Corrupted Microsoft Office documents and ZIP files are being utilized in a phishing campaign that evades antivirus detection, according to ANY.RUN. This tactic, used since at least August 2024, involves intentionally corrupting files to bypass email security measures while still facilitating the recovery of malicious content.

Corrupted Microsoft Office files used in new phishing tactic

ANY.RUN reported that corrupted documents are crafted to slip past email filters and antivirus software, allowing phishing emails to reach targeted users. Unlike conventional malware, these files aren’t flagged as suspicious due to their corrupted state, which hinders scanning capabilities. The phishing campaign uses QR codes within documents to lead users to fraudulent Microsoft account login pages, mimicking legitimate communication regarding employee bonuses and benefits.

Samples of these documents, analyzed by ANY.RUN, showed that attachments delivered in this manner often yield no malicious flags when tested with VirusTotal. Scammers have developed corrupt documents specifically designed to evade content filters while maintaining enough integrity for Microsoft Word to recover them.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

The malicious files used in this campaign are designed to exploit the recovery functionalities of Microsoft Word and WinRAR. By manipulating the integrity of the files, attackers ensure that when users open these documents, the in-built recovery features make the files readable, thereby masking their malicious intent. This technique effectively allows attackers to bypass traditional scanning methods that many security software rely on.

How hackers are using corrupted Microsoft Office files to fool everyone
ANY.RUN reported that corrupted documents are crafted to slip past email filters and antivirus software (Image: ANY.RUN)

Investigations have identified this as a potential zero-day exploit, demonstrating a sophisticated understanding of software mechanics by threat actors. The goal remains clear: users are deceived into opening these corrupted files, leading to the activation of embedded QR codes that redirect them to fake websites designed to harvest credentials or deliver malware.

Security experts stress the importance of user awareness in the face of increasingly complex phishing attempts. Organizations must prioritize security awareness training, particularly for employees handling role-specific communications such as those about bonuses. Such training equips staff to recognize phishing attempts disguised as legitimate correspondence, reducing the risk of falling victim to these schemes.

Active measures to combat these threats include enhancing email filtering capabilities to detect patterns of file corruption or suspicious content that may not trigger traditional security alerts. In recent years, strategies such as blocking macros in Microsoft Office documents have been implemented to mitigate risks from similar methods of file exploitation. The continuous evolution of phishing tactics, such as embedding malicious links in QR codes, necessitates adaptive strategies from cybersecurity professionals and organizations alike.

The increasing prevalence of QR code phishing, also known as “quishing,” adds another layer of complication, with many users unaware of the risks associated with scanning codes. Cybersecurity solutions are becoming equipped with enhanced QR code detection measures, yet the sophistication of threats means potential vulnerabilities persist.


Featured image credit: Sasun Bughdaryan/Unsplash

Tags: CybersecurityMicrosoft

Related Posts

Zoom announces AI Companion 3.0 at Zoomtopia

Zoom announces AI Companion 3.0 at Zoomtopia

September 19, 2025
Google Cloud adds Lovable and Windsurf as AI coding customers

Google Cloud adds Lovable and Windsurf as AI coding customers

September 19, 2025
Radware tricks ChatGPT’s Deep Research into Gmail data leak

Radware tricks ChatGPT’s Deep Research into Gmail data leak

September 19, 2025
Elon Musk’s xAI chatbot Grok exposed hundreds of thousands of private user conversations

Elon Musk’s xAI chatbot Grok exposed hundreds of thousands of private user conversations

September 19, 2025
Roblox game Steal a Brainrot removes AI-generated character, sparking fan backlash and a debate over copyright

Roblox game Steal a Brainrot removes AI-generated character, sparking fan backlash and a debate over copyright

September 19, 2025
DeepSeek releases R1 model trained for 4,000 on 512 H800 GPUs

DeepSeek releases R1 model trained for $294,000 on 512 H800 GPUs

September 19, 2025

LATEST NEWS

Zoom announces AI Companion 3.0 at Zoomtopia

Google Cloud adds Lovable and Windsurf as AI coding customers

Radware tricks ChatGPT’s Deep Research into Gmail data leak

Elon Musk’s xAI chatbot Grok exposed hundreds of thousands of private user conversations

Roblox game Steal a Brainrot removes AI-generated character, sparking fan backlash and a debate over copyright

DeepSeek releases R1 model trained for $294,000 on 512 H800 GPUs

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.