News
While the ultimate goal of this phishing attack is nothing new, its use of corrupted Word documents is a novel tactic used to evade detection. "Although these files operate successfully within the ...
Hosted on MSN8mon
Corrupted Microsoft Word files used to launch phishing attacksA new report from cybersecurity researchers Any.Run observed crooks distributing corrupted Microsoft Word files in their campaigns. Most phishing emails come with an attachment.
How the delete-upon-save bug works According to Microsoft, this bug currently affects Microsoft 365 version 2409 and occurs with files that have a file extension that’s saved in all capital letters.
When opened, the files prompt Microsoft Word’s recovery mode, which reconstructs the document and displays instructions to scan a QR code. Scanning the code redirects users to a fake Microsoft login ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results