Close Menu
Beverly Hills Examiner

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Literary Fiction Picks for You

    August 2, 2025

    Tim Burton’s Batman Movies Glide Back to Theaters for One Night Only

    August 2, 2025

    Dane Terry Guests on “If These Walls Could Talk” With Hosts Wendy Stuart and Tym Moss Wednesday, August 6th, 2025

    August 2, 2025
    Facebook X (Twitter) Instagram
    Beverly Hills Examiner
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    Beverly Hills Examiner
    Home»Technology»Microsoft Follina Vulnerability in Windows Can Be Exploited Through Office 365
    Technology

    Microsoft Follina Vulnerability in Windows Can Be Exploited Through Office 365

    By AdminJune 3, 2022
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Microsoft Follina Vulnerability in Windows Can Be Exploited Through Office 365


    Researchers warned last weekend that a flaw in Microsoft’s Support Diagnostic Tool could be exploited using malicious Word documents to remotely take control of target devices. Microsoft released guidance on Monday, including temporary defense measures. By Tuesday, the United States Cybersecurity and Infrastructure Security Agency had warned that “a remote, unauthenticated attacker could exploit this vulnerability,” known as Follina, “to take control of an affected system.” But Microsoft would not say when or whether a patch is coming for the vulnerability, even though the company acknowledged that the flaw was being actively exploited by attackers in the wild. And the company still had no comment about the possibility of a patch when asked by WIRED yesterday.

    The Follina vulnerability in a Windows support tool can be easily exploited by a specially crafted Word document. The lure is outfitted with a remote template that can retrieve a malicious HTML file and ultimately allow an attacker to execute Powershell commands within Windows. Researchers note that they would describe the bug as a “zero-day,” or previously unknown vulnerability, but Microsoft has not classified it as such.

    “After public knowledge of the exploit grew, we began seeing an immediate response from a variety of attackers beginning to use it,” says Tom Hegel, senior threat researcher at security firm SentinelOne. He adds that while attackers have primarily been observed exploiting the flaw through malicious documents thus far, researchers have discovered other methods as well, including the manipulation of HTML content in network traffic.

     “While the malicious document approach is highly concerning, the less documented methods by which the exploit can be triggered are troubling until patched,” Hegel says. “I would expect opportunistic and targeted threat actors to use this vulnerability in a variety of ways when the option is available—it’s just too easy.” 

    The vulnerability is present in all supported versions of Windows and can be exploited through Microsoft Office 365, Office 2013 through 2019, Office 2021, and Office ProPlus. Microsoft’s main proposed mitigation involves disabling a specific protocol within Support Diagnostic Tool and using Microsoft Defender Antivirus to monitor for and block exploitation. 

    But incident responders say that more action is needed, given how easy it is to exploit the vulnerability and how much malicious activity is being detected. 

    “We are seeing a variety of APT actors incorporate this technique into longer infection chains that utilize the Follina vulnerability,” says Michael Raggi, a staff threat researcher at the security firm Proofpoint who focuses on Chinese government-backed hackers. “For instance, on May 30, 2022, we observed Chinese APT actor TA413 send a malicious URL in an email which impersonated the Central Tibetan Administration. Different actors are slotting in the Follina-related files at different stages of their infection chain, depending on their preexisting toolkit and deployed tactics.”

    Researchers have also seen malicious documents exploiting Follina with targets in Russia, India, the Philippines, Belarus, and Nepal. An undergraduate researcher first noticed the flaw in August 2020, but it was first reported to Microsoft on April 21. Researchers also noted that Follina hacks are particularly useful to attackers because they can stem from malicious documents without relying on Macros, the much-abused Office document feature that Microsoft has worked to rein in.

    “Proofpoint has identified a variety of actors incorporating the Follina vulnerability within phishing campaigns,” says Sherrod DeGrippo, Proofpoint’s vice president of threat research.

    With all this real-world exploitation, the question is whether the guidance Microsoft has published so far is adequate and proportionate to the risk. 

    “Security teams could view Microsoft’s nonchalant approach as a sign that this is ‘just another vulnerability,’ which it most certainly is not,” says Jake Williams, director of cyber threat intelligence at the security firm Scythe. “It’s not clear why Microsoft continues to downplay this vulnerability, especially while it’s being actively exploited in the wild.”





    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleMiscarriage: How losing access to abortion will affect treatment for pregnancy loss
    Next Article Inside the Race to Save Ukraine’s Greatest Treasures – Tug of War

    RELATED POSTS

    Kleiner Perkins is having a very good week

    August 1, 2025

    Uber’s Drive to Become the Kleenex of Robotaxis

    August 1, 2025

    Apple has now sold 3 billion iPhones

    July 31, 2025

    8 Best Sexy Gifts for Lovers (2025)

    July 31, 2025

    SpaceX faces two new lawsuits alleging safety‐related retaliation

    July 30, 2025

    The Hyperflexible People Who May Help Unlock Better Sleep Apnea Treatments

    July 30, 2025
    latest posts

    Literary Fiction Picks for You

    01 Aug 2025 Beautiful, Broken, Real: Literary Fiction Picks for You These books aren’t afraid…

    Tim Burton’s Batman Movies Glide Back to Theaters for One Night Only

    August 2, 2025

    Dane Terry Guests on “If These Walls Could Talk” With Hosts Wendy Stuart and Tym Moss Wednesday, August 6th, 2025

    August 2, 2025

    Everyone’s watching Jerome Powell as warnings flash for the U.S. economy

    August 1, 2025

    Trump Has An Unhinged Meltdown And Suggests Terrible Jobs Numbers Were Rigged As He Crashes The Economy

    August 1, 2025

    NFL news: Cowboys’ CeeDee Lamb expresses support for Micah Parsons

    August 1, 2025

    Kleiner Perkins is having a very good week

    August 1, 2025
    Categories
    • Books (673)
    • Business (5,579)
    • Film (5,514)
    • Lifestyle (3,621)
    • Music (5,569)
    • Politics (5,570)
    • Science (4,925)
    • Technology (5,512)
    • Television (5,191)
    • Uncategorized (1)
    • US News (5,565)
    popular posts

    The Best AUG Loadout In Warzone Pacific Season 4 (July 2022)

    To create the best AUG loadout in Warzone, players can use certain attachments to increase…

    New Leonard Cohen Anthology Released: Listen

    June 3, 2022

    Tragic killing in SF, Twitter sends dogecoin soaring, and Android gains an account deletion option

    April 9, 2023

    Doomsday Is Going To Make Doctor Doom Stronger Than Thanos

    April 5, 2025
    Archives
    Browse By Category
    • Books (673)
    • Business (5,579)
    • Film (5,514)
    • Lifestyle (3,621)
    • Music (5,569)
    • Politics (5,570)
    • Science (4,925)
    • Technology (5,512)
    • Television (5,191)
    • Uncategorized (1)
    • US News (5,565)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    NFL news: Cowboys’ CeeDee Lamb expresses support for Micah Parsons

    August 1, 2025

    Kleiner Perkins is having a very good week

    August 1, 2025

    The First Widespread Cure for HIV Could Be in Children

    August 1, 2025
    © 2025 Beverly Hills Examiner. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT