Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
This widget could not be displayed.
4 Replies

We are witnessing a surge in weaponized Microsoft documents containing a macro.

This campaign has very low detection by signature based solutions. It uses advanced social engineering techniques designed to make the user open the document and enable the macro. As you can see in the screen shots these are similar but more graphically adapt to the notorious locky campaign of 2016.

            Screen shot of documents cleaned by Threat Extraction.

The last couple of days show a ten fold increase in the malicious files.

The surge as seen in numbers in the last week. 

SandBlast Threat Extraction cleans the macro from the document at zero time.

SandBlast prevents the download of the original file by three zero day engines: Macro Analyzer, CPU level detection on crash and the emulator by its malicious process activity.

I'll update when there is more data.

Thanks,

Gadi

Quick and Dirty Alert

Quick and Dirty Alert

We are witnessing a surge in weaponized Microsoft documents containing a macro.

This campaign has very low detection by signature based solutions. It uses advanced social engineering techniques designed to make the user open the document and enable the macro. As you can see in the screen shots these are similar but more graphically adapt to the notorious locky campaign of 2016.

            Screen shot of documents cleaned by Threat Extraction.

The last couple of days show a ten fold increase in the malicious files.

The surge as seen in numbers in the last week. 

SandBlast Threat Extraction cleans the macro from the document at zero time.

SandBlast prevents the download of the original file by three zero day engines: Macro Analyzer, CPU level detection on crash and the emulator by its malicious process activity.

I'll update when there is more data.

Thanks,

Gadi

We are witnessing a surge in weaponized Microsoft documents containing a macro.

This campaign has very low detection by signature based solutions. It uses advanced social engineering techniques designed to make the user open the document and enable the macro. As you can see in the screen shots these are similar but more graphically adapt to the notorious locky campaign of 2016.

            Screen shot of documents cleaned by Threat Extraction.

The last couple of days show a ten fold increase in the malicious files.

The surge as seen in numbers in the last week. 

SandBlast Threat Extraction cleans the macro from the document at zero time.

SandBlast prevents the download of the original file by three zero day engines: Macro Analyzer, CPU level detection on crash and the emulator by its malicious process activity.

I'll update when there is more data.

Thanks,

Gadi

Gad_Naveh
Employee Alumnus
Employee Alumnus
Gad_Naveh
Employee Alumnus
Employee Alumnus

Hi Vladimir,

Yes, TE is able to catch it and prevent it.

I'll upload a report

Hi Vladimir,

Yes, TE is able to catch it and prevent it.

I'll upload a report

Ryan_St__Germai
Advisor
Ryan_St__Germai
Advisor

Sample this morning came with two word documents. AV Blade caught the emails. Does Emotet usually send two attachments?

Sample this morning came with two word documents. AV Blade caught the emails. Does Emotet usually send two attachments?

0 Kudos
0 Kudos
Gad_Naveh
Employee Alumnus
Employee Alumnus
Gad_Naveh
Employee Alumnus
Employee Alumnus

Not that I am aware of, please do share

Not that I am aware of, please do share