{"id":19252,"date":"2022-06-04T10:45:07","date_gmt":"2022-06-04T18:45:07","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/06\/04\/news-12985\/"},"modified":"2022-06-04T10:45:07","modified_gmt":"2022-06-04T18:45:07","slug":"news-12985","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/06\/04\/news-12985\/","title":{"rendered":"An Actively Exploited Microsoft Zero-Day Flaw Still Has No Patch"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/629807ff0b696b70815a79d8\/master\/pass\/Microsoft-Zero-Day-Vulnerability-Security-GettyImages-1289940352.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Fri, 03 Jun 2022 14:14:30 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/lily-hay-newman\">Lily Hay Newman<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">Researchers warned last<\/span> weekend that a flaw in Microsoft&#x27;s Support Diagnostic Tool could be exploited using malicious Word documents to remotely take control of target devices. Microsoft <a data-offer-url=\"https:\/\/msrc-blog.microsoft.com\/2022\/05\/30\/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/msrc-blog.microsoft.com\/2022\/05\/30\/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability\/&quot;}\" href=\"https:\/\/msrc-blog.microsoft.com\/2022\/05\/30\/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability\/\" rel=\"nofollow noopener\" target=\"_blank\">released guidance<\/a> on Monday, including temporary defense measures. By Tuesday, the United States Cybersecurity and Infrastructure Security Agency had <a data-offer-url=\"http:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/05\/31\/microsoft-releases-workaround-guidance-msdt-follina-vulnerability\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/05\/31\/microsoft-releases-workaround-guidance-msdt-follina-vulnerability&quot;}\" href=\"http:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/05\/31\/microsoft-releases-workaround-guidance-msdt-follina-vulnerability\" rel=\"nofollow noopener\" target=\"_blank\">warned<\/a> that \u201ca remote, unauthenticated attacker could exploit this vulnerability,\u201d known as Follina, \u201cto take control of an affected system.\u201d But Microsoft would not say when or whether a patch is coming for the vulnerability, even though the company acknowledged that the flaw was being actively exploited by attackers in the wild. And the company still had no comment about the possibility of a patch when asked by WIRED yesterday.<\/p>\n<p class=\"paywall\">The Follina vulnerability in a Windows support tool can be easily exploited by a specially crafted Word document. The lure is outfitted with a remote template that can retrieve a malicious HTML file and ultimately allow an attacker to execute <a href=\"https:\/\/www.wired.com\/story\/microsoft-powershell-security\/\">Powershell commands<\/a> within Windows. Researchers note that they would describe the bug as a \u201czero-day,\u201d or previously unknown vulnerability, but Microsoft has not classified it as such.<\/p>\n<p class=\"paywall\">\u201cAfter public knowledge of the exploit grew, we began seeing an immediate response from a variety of attackers beginning to use it,\u201d says Tom Hegel, senior threat researcher at security firm SentinelOne. He adds that while attackers have primarily been observed exploiting the flaw through malicious documents thus far, researchers have discovered other methods as well, including the manipulation of HTML content in network traffic.<\/p>\n<p class=\"paywall\">\u00a0\u201cWhile the malicious document approach is highly concerning, the less documented methods by which the exploit can be triggered are troubling until patched,\u201d Hegel says. \u201cI would expect opportunistic and targeted threat actors to use this vulnerability in a variety of ways when the option is available\u2014it\u2019s just too easy.\u201d\u00a0<\/p>\n<p class=\"paywall\">The vulnerability is present in all supported versions of Windows and can be exploited through Microsoft Office 365, Office 2013 through 2019, Office 2021, and Office ProPlus. Microsoft&#x27;s main proposed mitigation involves disabling a specific protocol within Support Diagnostic Tool and using Microsoft Defender Antivirus to monitor for and block exploitation.\u00a0<\/p>\n<p class=\"paywall\">But incident responders say that more action is needed, given how easy it is to exploit the vulnerability and how much malicious activity is being detected.\u00a0<\/p>\n<p class=\"paywall\">\u201cWe are seeing a variety of APT actors incorporate this technique into longer infection chains that utilize the Follina vulnerability,&quot; says Michael Raggi, a staff threat researcher at the security firm Proofpoint who focuses on Chinese government-backed hackers. &quot;For instance, on May 30, 2022, we observed Chinese APT actor TA413 send a malicious URL in an email which impersonated the Central Tibetan Administration. Different actors are slotting in the Follina-related files at different stages of their infection chain, depending on their preexisting toolkit and deployed tactics.\u201d<\/p>\n<p class=\"paywall\">Researchers have also <a data-offer-url=\"https:\/\/twitter.com\/BaoshengbinCumt\/status\/1531821860744478720?s=20&amp;t=aSVAKp58x0sTdSoclpLJEw\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/BaoshengbinCumt\/status\/1531821860744478720?s=20&amp;t=aSVAKp58x0sTdSoclpLJEw&quot;}\" href=\"https:\/\/twitter.com\/BaoshengbinCumt\/status\/1531821860744478720?s=20&amp;t=aSVAKp58x0sTdSoclpLJEw\" rel=\"nofollow noopener\" target=\"_blank\">seen<\/a> malicious documents <a data-offer-url=\"https:\/\/twitter.com\/nao_sec\/status\/1530196847679401984\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/nao_sec\/status\/1530196847679401984&quot;}\" href=\"https:\/\/twitter.com\/nao_sec\/status\/1530196847679401984\" rel=\"nofollow noopener\" target=\"_blank\">exploiting<\/a> Follina with targets in Russia, India, the Philippines, Belarus, and Nepal. An undergraduate researcher first <a data-offer-url=\"https:\/\/benjamin-altpeter.de\/doc\/thesis-electron.pdf\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/benjamin-altpeter.de\/doc\/thesis-electron.pdf&quot;}\" href=\"https:\/\/benjamin-altpeter.de\/doc\/thesis-electron.pdf\" rel=\"nofollow noopener\" target=\"_blank\">noticed the flaw in August 2020<\/a>, but it was first reported to Microsoft on April 21. Researchers also noted that Follina hacks are particularly useful to attackers because they can stem from malicious documents without relying on Macros, the much-abused Office document feature that Microsoft has <a href=\"https:\/\/www.wired.com\/story\/microsoft-disables-macros-default-security-phishing\/\">worked to rein in<\/a>.<\/p>\n<p class=\"paywall\">\u201cProofpoint has identified a variety of actors incorporating the Follina vulnerability within phishing campaigns,&quot; says Sherrod DeGrippo, Proofpoint&#x27;s vice president of threat research.<\/p>\n<p class=\"paywall\">With all this real-world exploitation, the question is whether the guidance Microsoft has published so far is adequate and proportionate to the risk.\u00a0<\/p>\n<p class=\"paywall\">\u201cSecurity teams could view Microsoft\u2019s nonchalant approach as a sign that this is \u2018just another vulnerability,\u2019 which it most certainly is not,\u201d says Jake Williams, director of cyber threat intelligence at the security firm Scythe. \u201cIt\u2019s not clear why Microsoft continues to downplay this vulnerability, especially while it\u2019s being actively exploited in the wild.\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/microsoft-follina-vulnerability-windows-office-365\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/629807ff0b696b70815a79d8\/master\/pass\/Microsoft-Zero-Day-Vulnerability-Security-GettyImages-1289940352.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Fri, 03 Jun 2022 14:14:30 +0000<\/strong><\/p>\n<p>The company continues to downplay the severity of the Follina vulnerability, which remains present in all supported versions of Windows.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-19252","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19252"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19252\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}