Monday 31 March 2014

Microsoft Word is on hacker's way

Microsoft, the largest company of IT field, shared a news about its well known and trustworthy tool-suite product Microsoft Office on the hand of hackers. From Microsoft, it has been shared that MS Office is on the way of hacking almost. In the technology market, it is now spreading that hackers now found a way to hack booby-trap certain common word file with the extension ".rtf".



                          


Hackers got the way to hack any ".rtf" file format of any user easily by changing codes. As always, MS Office files are favorite activity of hackers which was quite difficult but now the involvement of new cloud based technology, it can be possible by "Crigent" or "Power Worm" types hacking method.
In this method, instead of creating any virus file or code, "Crigent" uses a legitimate techniques as Windows Powershell, Google DNS Servers and cloud based storage techniques as Dropbox or Microsoft's OneDrive. By this, the incredulous activities of hackers can't be inspected by network administrator. 

                        


This attack activity can be divided into three logical parts as acquiring the components, running commands and infecting the files. Now the real question here is,"How hacker is able to do that??".
Actually, a hacker can manage your computer access completely when you open booby-trapped file on your system. By this, hacker gains all type of control on your computer and can put illegal "botnet" to turn on your computer as  "zombie". With this, hacker can use your computer as a bigger network of computer's part to do legitimate or suspicious  activity like spreading virus, committing fraud or any other hacking activity.  

                  


Microsoft is stated a news about the aware of this attacks but still this bug has not been fixed yet to stop hackers. They are working on way of fixing this bug in MS Office. But for today,the sole means to become secured by this attack is not to open a document with ".rtf" extension to Microsoft finds a solution of this bug. 

No comments:

Post a Comment