First and foremost, let’s get
straight to the point. Microsoft has identified a vulnerability that exists in
their Excel
application. This information comes to us (the general public) courtesy
of MITRE’s CVE (common vulnerability and exposures). Essentially, the way the
attack works is a hacker who has exploited the vulnerability running malicious
code as if he or she were the current user. Also, say that user had admin
rights – the hacker could completely take control of the system that’s been
affected. Once the hacker is in, he or she is in control. There is an array of
stuff for him/her to do, but most likely he will install programs, modify or
delete important data, even create new accounts with full admin creds (user
rights) - which would allow him to grant himself access to the system under a
seemingly appropriate alias. If you are an Excel user, I encourage you to
install Microsoft’s latest update to ensure that you are protected.
The title of this specific
vulnerability is Remote Code Execution, but this is AKA an Injection Attack,
and there are many of these types of attacks that exists. An Injection Attack
is an exploitation where an attacker can send code to a target system with the
aim of altering its processes, and/or corrupting its data set. Many exist, but
one of the most common is a SQL Injection, which is an attack that stays in
business by relying on SQL query statements and gathering information about
your system’s database structure from those errors.
This is actually one of the most
common web-based hacking practices. Not to mention, that code inject could
potentially destroy your entire database. Me specifically, I like to respond to
spam texts with SQL Injections – because you shouldn’t bring a knife to a gun
fight. Among other injection attacks we have XSS (Cross Site Scripting) which
is not as much of a risk as SQL Injections because XSS targets customers and
visitors to websites, whereas SQL injections target organizational assets.
Join my next Webinar to learn more
about Code Injections including SQL Injection in more detail, XSS Cross Site
Scripting, Command injections, HTML Injections, Code Injections and File
Injections! And remember to patch your systems!
No comments:
Post a Comment