Microsoft issues Windows attack warning that uses malicious Office files

Don't open Office files unless it's from a source you fully trust.

Sponsored Links

A Microsoft logo is seen at a pop-up site for the new Windows 10 operating system at Roosevelt Field in Garden City, New York July 29, 2015. Microsoft Corp's launch of its first new operating system in almost three years, designed to work across laptops, desktop and smartphones, won mostly positive reviews for its user-friendly and feature-packed interface.REUTERS/Shannon Stapleton
Shannon Stapleton / reuters

Attackers are actively exploiting a Microsoft remote code execution vulnerability using malicious Office files, the tech giant has warned. The vulnerability known as CVE-2021-40444 affects Windows Servers from version 2008 and Windows 7 through 10. What attackers are doing is sending potential victims an Office file and tricking them into opening it. That file automatically opens Internet Explorer to load the bad actor's web page, which has an ActiveX control that downloads malware onto the victim's computer.

Several security researchers reported the zero-day attacks to Microsoft. One of them, Haifei Li of EXPMON, told BleepingComputer that the method is 100 percent reliable — all it would take to infect a system is for the victim to open the malicious file. In Li's case, the attack they came across used a .DOCX document. Microsoft has yet to roll out a security patch for the vulnerability, but it has published mitigation methods to prevent infection. 

The tech giant says Microsoft Defender Antivirus and Microsoft Defender for Endpoint can both detect the vulnerability and prevent infection, so users need to keep them updated and running. Further, it advises disabling all ActiveX controls in Internet Explorer to render it inactive for all websites. Microsoft's security warning contains information how to do that, which involves updating IE's registry and rebooting the computer.

All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission.
Popular on Engadget