It really is a minefield out there! A cyber minefield, but a minefield nonetheless.
Cyber Threat Analyst have discovered a new malware delivery method that uses a PowerPoint file embedded in an email as its vector. The email body directs the reader to “see attached” item. The email message attempts to entice the reader by referring to the attachment as an ‘invoice’, ‘receipt’, ‘purchase order’, or other important document.
When the email recipient hovers the mouse over the attached file icon, BOOM, the file is activated (no click necessary), and the reader will get “Loading…Please Wait” displayed on their screen. This is able to happen by exploiting a Microsoft Powerpoint feature of the PowerPoint Presentation mode. It is important to note that Microsoft states that this feature defaults to Office Protected View to protect against the success of this technique. However, the bad guys cast a web of phishing emails in the hopes to catch a few off guard…then it is payday!
What can you do to ensure you are protected by this, and other, cyber minefields? First, closely scrutinize any email you receive that is not personalized in the greeting or subject. Always look at the senders return email address. Be sure it is someone you are familiar with, or from an organization with whom you exchange information of the type described in the email.
Finally, ensure that your Microsoft Office settings are properly configured so that Office Protected is enabled.
Please contact us for more information!