{"id":19181,"date":"2022-05-30T10:10:09","date_gmt":"2022-05-30T18:10:09","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/05\/30\/news-12914\/"},"modified":"2022-05-30T10:10:09","modified_gmt":"2022-05-30T18:10:09","slug":"news-12914","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/05\/30\/news-12914\/","title":{"rendered":"Microsoft Office zero-day &#8220;Follina&#8221;\u2014it\u2019s not a bug, it\u2019s a feature! (It&#8217;s a bug)"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Mon, 30 May 2022 18:09:26 +0000<\/strong><\/p>\n<p>Several researchers have come across a novel attack that circumvents Microsoft&#8217;s Protected View and anti-malware detection.<\/p>\n<p>The attack vector uses the Word remote template feature to retrieve an HTML file from a remote webserver. It goes on to use the <code>ms-msdt<\/code> protocol URI scheme to load some code, and then execute some PowerShell.<\/p>\n<p>All of the above methods are features, but if we tell you that put together this allows an attacker to remotely run code on your system by tricking you into clicking a link, that sounds quite disturbing doesn\u2019t it?<\/p>\n<p>Well, you&#8217;d be right to be concerned. That little sequence of features adds up to a zero-day flaw in Microsoft Office that is being abused in the wild to achieve arbitrary code execution on Windows systems. <\/p>\n<p>Jerome Segura, Malwarebytes&#8217; Senior Director, Threat Intelligence:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>This elegant attack is designed to bypass security products and fly under the radar by leveraging Microsoft Office&#8217;s remote template feature and the ms-msdt protocol to execute malicious code, all without the need for macros.<\/p>\n<\/blockquote>\n<p>The most prominent researchers working on the issue have dubbed the vulnerability in Microsoft Office <strong>Follina<\/strong>, because a sample uploaded to VirusTotal included the area code for the Italian comune Follina.<\/p>\n<h2>Affected versions<\/h2>\n<p>Under normal circumstances, files from potentially unsafe locations are opened as read only or in Protected View. However, this warning can be easily bypassed by changing the document to a Rich Text Format (RTF) file. By doing so, the code can run without even opening the document via the preview tab in Explorer.<\/p>\n<p>While the research is ongoing and the info security community is testing and probing, we are receiving some mixed signals whether the latest, fully patched,&nbsp;version of Office 365 is vulnerable to this type of attack or not. Older versions are certainly vulnerable, which already makes it a problem with a huge attack surface.<\/p>\n<p>Researcher Kevin Beaumont <a href=\"https:\/\/doublepulsar.com\/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">provides the example<\/a> where an attacker can send an email with this text as a hyperlink:<\/p>\n<pre class=\"wp-block-preformatted\">ms-excel:ofv|u|https:\/\/blah.com\/poc.xls<\/pre>\n<p>And Outlook will allow the user to click the hyperlink and open the Excel document. Because the document isn\u2019t attached to the email, and the URI doesn\u2019t start with http or https, most email gateways are going to let that slide straight through as nothing appears malicious.<\/p>\n<p>As we stated earlier, even looking at a specially crafted file in the preview pane of Windows Explorer could trigger the attack. Microsoft has been made aware of the issues and the possible consequences. While its first reaction was that there was no security issue, it seems this needs to be fixed.<\/p>\n<h2>Mitigation<\/h2>\n<p>There are a few things you can do to stop some or all of the \u201cfeatures\u201d used in this type of attack.<\/p>\n<h3>Unregister the ms-msdt protocol<\/h3>\n<p>Will Dormann, a vulnerability analyst at the CERT\/CC has <a href=\"https:\/\/gist.github.com\/wdormann\/031962b9d388c90a518d2551be58ead7\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">published a registry fix<\/a> that will unregister the ms-msdt protocol.<\/p>\n<p>Copy and paste the text into a notepad document:<\/p>\n<ul>\n<li>Click on <strong>File<\/strong>, then <strong>Save As&#8230;<\/strong><\/li>\n<li>Save it to your Desktop, then name the file <code>disable_ms-msdt.reg<\/code> in the file name box.<\/li>\n<li>Click <strong>Save<\/strong>, and close the notepad document.<\/li>\n<li>Double-click the file <code>disable_ms-msdt.reg<\/code> on your desktop.<\/li>\n<\/ul>\n<p>Note, if you are prompted by User Account Control, select <strong>Yes<\/strong> or <strong>Allow<\/strong> so the fix can continue.<\/p>\n<ul>\n<li>A message will appear about adding information into the registry, click <strong>Yes<\/strong> when prompted<\/li>\n<li>A prompt should appear that the information was added successfully<\/li>\n<\/ul>\n<h3>Disable preview in Windows Explorer<\/h3>\n<p>If you have the preview pane enabled, you can:<\/p>\n<ul>\n<li>Open File Explorer.<\/li>\n<li>Click on <strong>View<\/strong> Tab.<\/li>\n<li>Click on <strong>Preview Pane<\/strong> to hide it.<\/li>\n<\/ul>\n<h3>Enable Malwarebytes\u2019 Block penetration testing attacks<\/h3>\n<p>The Malwarebytes&#8217; <strong>Block penetration testing attacks<\/strong> setting is an aggressive detection setting that will block this attack. It is not enabled by default because while enabling it provides additional blocking capabilities for Exploit Protection it can increase false positives, or result in other application conflicts.<\/p>\n<p>To enable it:<\/p>\n<ul>\n<li>Open <strong>Settings<\/strong><\/li>\n<li>Click <strong>Security<\/strong><\/li>\n<li>Choose <strong>Advanced settings<\/strong><\/li>\n<li>Tick <strong>Block penetration testing attacks<\/strong><\/li>\n<\/ul>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"57008\" data-permalink=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/05\/microsoft-office-zero-day-follina-its-not-a-bug-its-a-feature-its-a-bug\/attachment\/follina\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/Follina.gif\" data-orig-size=\"1143,786\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Follina\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/Follina-300x206.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/Follina-600x413.gif\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/Follina.gif\" alt=\"\" class=\"wp-image-57008\" width=\"700\" height=\"479\" \/><\/figure>\n<\/div>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/05\/microsoft-office-zero-day-follina-its-not-a-bug-its-a-feature-its-a-bug\/\">Microsoft Office zero-day &#8220;Follina&#8221;\u2014it\u2019s not a bug, it\u2019s a feature! (It&#8217;s a bug)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/05\/microsoft-office-zero-day-follina-its-not-a-bug-its-a-feature-its-a-bug\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Mon, 30 May 2022 18:09:26 +0000<\/strong><\/p>\n<p>Researchers around the world are working to understand a new remote code vulnerability in Microsoft Office dubbed Follina.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/05\/microsoft-office-zero-day-follina-its-not-a-bug-its-a-feature-its-a-bug\/\">Microsoft Office zero-day &#8220;Follina&#8221;\u2014it\u2019s not a bug, it\u2019s a feature! (It&#8217;s a bug)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[22783,26337,26338,26339,26340,11993],"class_list":["post-19181","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-exploits-and-vulnerabilities","tag-follina","tag-ms-msdt","tag-preview-pane","tag-protected-view","tag-rtf"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19181"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19181\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}