• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

State-Backed Hackers Exploit Microsoft ‘Follina’ Bug to Target Entities in Europe and U.S

You are here: Home / Cyber Security News / State-Backed Hackers Exploit Microsoft ‘Follina’ Bug to Target Entities in Europe and U.S

A suspected point out-aligned danger actor has been attributed to a new established of assaults exploiting the Microsoft Office “Follina” vulnerability to goal governing administration entities in Europe and the U.S.

Company security organization Proofpoint explained it blocked makes an attempt at exploiting the remote code execution flaw, which is currently being tracked CVE-2022-30190 (CVSS rating: 7.8). No significantly less than 1,000 phishing messages made up of a entice document had been sent to the targets.

“This campaign masqueraded as a salary increase and used an RTF with the exploit payload downloaded from 45.76.53[.]253,” the corporation said in a series of tweets.

The payload, which manifests in the variety of a PowerShell script, is Foundation64-encoded and capabilities as a downloader to retrieve a second PowerShell script from a remote server named “vendor-notification[.]reside.”

“This script checks for virtualization, steals details from local browsers, mail shoppers and file companies, conducts equipment recon and then zips it for exfil[tration] to 45.77.156[.]179,” the corporation included.

The phishing marketing campaign has not been linked to a formerly recognised team, but explained it was mounted by a country-state actor dependent on the specificity of the targeting and the PowerShell payload’s large-ranging reconnaissance capabilities.

The development follows energetic exploitation attempts by a Chinese risk actor tracked as TA413 to produce weaponized ZIP archives with malware-rigged Microsoft Phrase documents.

The Follina vulnerability, which leverages the “ms-msdt:” protocol URI scheme to remotely take manage of concentrate on products, continues to be unpatched, with Microsoft urging consumers to disable the protocol to protect against the attack vector.

“Proofpoint carries on to see focused assaults leveraging CVE-2022-30190,” Sherrod DeGrippo, vice president of risk study, reported in a statement shared with The Hacker News.

“The comprehensive reconnaissance carried out by the second PowerShell script demonstrates an actor interested in a huge selection of application on a target’s laptop. This, coupled with the limited targeting of European governing administration and neighborhood U.S. governments led us to suspect this marketing campaign has a state aligned nexus.”

Identified this write-up interesting? Stick to THN on Fb, Twitter  and LinkedIn to read far more distinctive content material we put up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Automotive giant Stellantis pleads guilty to diesel emissions fraud
Next Post: Google's Nest cameras and smart doorbells fall to all-time lows at Amazon »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks
  • Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool
  • Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks
  • 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager
  • INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure

Copyright © 2025 · AllTech.News, All Rights Reserved.