Number of users attacked via Microsoft Office vulnerabilities in Africa has increased




In the second quarter of 2022 the number of exploits for vulnerabilities in the Microsoft Office suite increased globally compared to the first quarter – accounting for 82% of the total number of exploits across different platforms, according to the latest Kaspersky quarterly malware report. The Middle East, Turkey and Africa (META) region also saw an increase in the attacks via MS Office vulnerabilities.

MS Office vulnerabilities CVE-2021-40444CVE-2017-0199CVE-2017-11882 and CVE-2018-0802 were used by criminals most often during the second quarter, being exploited to attack more than 551 000 users in total. These attempts were countered by Kaspersky’s solutions; if the attackers had succeeded, they would have got control over victims’ computers to view, change, or delete data without their knowledge through remote execution of malicious code.

Vulnerability Attacked users in Q2 2022 Dynamics of attacked users, %
Q2 2022 vs Q1 2022
CVE-2021-40444 4,886 696%
CVE-2017-0199 60,132 59%
CVE-2017-11882 140,623 5%
CVE-2018-0802 345,827 3%

The comparative number of users affected by Microsoft Office vulnerabilities in Q2 2022, and associated dynamics

In Kenya the number of users attacked through these vulnerabilities in the Microsoft Office suite over the last quarter increased by 20%. Nigeria saw a 9% increase in the number of attacked users. In South Africa, the number of users attacked through these vulnerabilities decreased 3% in the second quarter compared to the first quarter, however, the upward trend in the number of such attacks globally keeps security operations centers on alert.

Kaspersky experts found that exploits for the vulnerability, designated CVE-2021-40444, were used to attack almost 5,000 people globally in the second quarter of 2022, which is eight times more than during the first quarter of 2022. The CVE-2021-40444 is a vulnerability in MSHTML, Internet Explorer’s engine. This web browser is a part of operating systems, as some software relies on its engine for working with online content – for instance, it is used by the components of the Microsoft Office.

“Since CVE-2021-40444 is quite easy to use, we expect an increase in its exploitation globally. Criminals craft malicious documents and convince their victims to open them through social engineering techniques. The Microsoft Office application then downloads and executes a malicious script. To be on the safe side, it is vital to install the vendor’s patch, use security solutions capable of detecting vulnerability exploitation, and to keep employees aware of modern cyberthreats,” comments Alexander Kolesnikov, malware analyst at Kaspersky. 

In order to prevent attacks via Microsoft Office vulnerabilities, Kaspersky researchers recommend implementing the following measures:

  • Provide your SOC team with access to the latest threat intelligence (TI). The Kaspersky Threat Intelligence Portal is a single point of access for the company’s TI, providing cyberattack data and insights gathered by Kaspersky over the past 20 years. To help businesses enable effective defenses in these turbulent times, Kaspersky announced free access to independent, continuously updated, and globally sourced information on ongoing cyberattacks and threats. Request access online
  • Receive relevant and up-to-date information on threats to be aware of and the TTPs used by attackers
  • Companies are advised to use a security solution that provides vulnerability management components, such as the Automatic Exploit Prevention within Kaspersky Endpoint Security for Business. This component monitors suspicious actions of applications and blocks the execution of malicious files
  • Use solutions such as Kaspersky Endpoint Detection and Response and Kaspersky Managed Detection and Response that help detect and prevent attacks at an early stage – before the attackers are able to achieve their goals

Advert:




Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.