{"id":15957,"date":"2023-07-17T17:11:08","date_gmt":"2023-07-17T17:11:08","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=15957"},"modified":"2024-05-31T01:07:54","modified_gmt":"2024-05-31T01:07:54","slug":"microsoft-cve-2023-36884-vulnerability","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/microsoft-cve-2023-36884-vulnerability\/","title":{"rendered":"Microsoft CVE-2023-36884 Vulnerability Exploited in the Wild"},"content":{"rendered":"<p>On July 11, 2023, Microsoft published an article about addressing the CVE-2023-36884 vulnerability. This breach <strong>allowed for remote code execution<\/strong> in Office and Windows HTML. Microsoft has acknowledged a targeted attack that exploits a <strong>vulnerability using specifically designed Microsoft Office documents<\/strong>. The attacker can gain control of a victim&#8217;s computer by creating a malicious Office document, but the victim must participate by opening it.<\/p>\n<p><strong>Microsoft discovered a phishing campaign<\/strong> conducted by a Threat Actor named Storm-0978. The targets were government and defense entities in Europe and North America. The Threat Actor used lures <strong>related to the Ukraine World Congress<\/strong> and exploited the vulnerability known as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36884\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2023-36884<\/a>.<\/p>\n<h2>Who is Storm-0978?<\/h2>\n<p>The cybercriminal group known as Storm-0978, based in Russia, is <strong>infamous for engaging in various illegal activities<\/strong>. These <a href=\"https:\/\/gridinsoft.com\/ransomware\">activities include conducting ransomware<\/a> and extortion operations, targeted campaigns to collect credentials, developing and distributing the RomCom backdoor, and <strong>deploying the Underground Ransomware<\/strong>.<\/p>\n<figure id=\"attachment_15997\" aria-describedby=\"caption-attachment-15997\" style=\"width: 790px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/GS_BLOG_Microsoft-CVE-2023-36884-Vulnerability-Exploited-in-the-Wild_790x460px.webp\" alt=\"Who is Storm-0978(RomCom)?\" width=\"790\" height=\"460\" class=\"size-full wp-image-15997\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/GS_BLOG_Microsoft-CVE-2023-36884-Vulnerability-Exploited-in-the-Wild_790x460px.webp 790w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/GS_BLOG_Microsoft-CVE-2023-36884-Vulnerability-Exploited-in-the-Wild_790x460px-300x175.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/GS_BLOG_Microsoft-CVE-2023-36884-Vulnerability-Exploited-in-the-Wild_790x460px-768x447.webp 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><figcaption id=\"caption-attachment-15997\" class=\"wp-caption-text\">Overall RomCom architecture<br \/><\/figcaption><\/figure>\n<p>Underground ransomware is <strong>associated with Industrial Spy Ransomware<\/strong>, detected in the wild in May 2022. Microsoft identified a recent campaign in June 2023 that exploited CVE-2023-36884 to distribute a RomCom-like backdoor. This was done by a group known as Storm-0978, who <strong>use a phishing site masquerading as legitimate software<\/strong> to infect users. The impersonated products include Adobe products, SolarWinds Network Performance Monitor, SolarWinds Orion, Advanced IP Scanner, KeePass, and Signal. Users unwittingly download and execute <strong>files that result in the infection<\/strong> of the RomCom backdoor by visiting these phishing sites.<\/p>\n<h2>CVE-2023-36884 Exploitation<\/h2>\n<p>Storm-0978 conducted a phishing campaign in June 2023, using a <a href=\"https:\/\/loaris.app\/blogs\/backdoor\/\" target=\"_blank\" rel=\"noopener nofollow\">fake OneDrive loader to deliver a backdoor<\/a> similar to RomCom. The phishing emails targeted defense and <strong>government entities in Europe and North America<\/strong>, with lures related to the Ukrainian World Congress, and led to exploitation via CVE-2023-36884 vulnerability.<\/p>\n<figure id=\"attachment_15970\" aria-describedby=\"caption-attachment-15970\" style=\"width: 750px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Storm-0978-phishing-email-1024x434.webp\" alt=\"CVE-2023-36884 Exploitation\" width=\"750\" height=\"318\" class=\"size-large wp-image-15970\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Storm-0978-phishing-email-1024x434.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Storm-0978-phishing-email-300x127.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Storm-0978-phishing-email-768x325.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Storm-0978-phishing-email.webp 1282w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption id=\"caption-attachment-15970\" class=\"wp-caption-text\">Storm-0978 email operates NATO themes and the Ukrainian World Congress<\/figcaption><\/figure>\n<p>During a phishing attempt, Microsoft detected that Storm-0978 used an exploit to target CVE-2023-36884.<\/p>\n<p>BlackBerry documented the <strong>attacks on guests for the upcoming NATO<\/strong> Summit on July 8, but <a href=\"https:\/\/gridinsoft.com\/zeroday\">the use of the zero-day in the attacks<\/a> was unknown at the time.<\/p>\n<p>The attackers used the <strong>RomCom variant for espionage<\/strong>, and Underground Ransomware was deployed for ransomware operations. The campaign indicates that Storm-0978 is a highly sophisticated group that seems to be also <strong>targeting multiple organizations in the future<\/strong>.<\/p>\n<h2>How do you avoid vulnerability?<\/h2>\n<p>Organizations should <strong>adopt all possible mitigation strategies<\/strong> until a patch is released. The vulnerability has been used in targeted attacks, and news of its existence will doubtlessly lead other attackers to <a href=\"https:\/\/gridinsoft.com\/exploits\">attempt to replicate the exploit<\/a>.<\/p>\n<p><strong>Microsoft offers performing the registry trick<\/strong> in order to prevent exploitation. In Regedit, go by the following path and find there <em>FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION<\/em> key.<\/p>\n<p><code>Computer\\HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\Main\\FeatureControl\\<\/code><\/p>\n<p>There, create REG_DWORD values with data 1 with the names of exploitable applications:<\/p>\n<div class=\"su-row\">\n<div class=\"su-column su-column-size-1-2\"><div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<ul>\n<li>Excel.exe<\/li>\n<li>Graph.exe<\/li>\n<li>MSAccess.exe<\/li>\n<li>MSPub.exe<\/li>\n<li>Powerpnt.exe<\/li>\n<\/ul>\n<\/div><\/div>\n<div class=\"su-column su-column-size-1-2\"><div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<ul>\n<li>Visio.exe<\/li>\n<li>WinProj.exe<\/li>\n<li>WinWord.exe<\/li>\n<li>Wordpad.exe<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div>\n<p>Though, patching the breach in <strong>such a way is not always enough<\/strong>. Hackers know about the offered fix and can find a way to revert it or exploit the breach by <strong>circumventing any registry blocks<\/strong>. For that reason, I also recommend having proactive and reactive security measures.<\/p>\n<ul>\n<li><strong>Activate cloud-delivered protection<\/strong> in your antivirus software to defend against constantly changing attacker methods. Cloud-based machine learning can detect and block most new and unknown threats.<\/li>\n<li><strong>Back up your data and store<\/strong> those backups offline or on a separate network for added protection. Backups are the ransomware attacks\u2019 kryptonite, as they can do nothing if you just recover everything back.<\/li>\n<li>Wherever possible and practical, <strong>enable automatic software updates<\/strong> on all connected devices, including your computer and mobile phone.<\/li>\n<li>To stay safe online, it&#8217;s crucial to <strong>always verify the authenticity of links and email attachments<\/strong> before opening them, especially if they&#8217;re from an untrusted source.<\/li>\n<li><strong>Use CDR solutions<\/strong>. <a href=\"https:\/\/gridinsoft.com\/cdr\">CDR, or Content Disarm and Reconstruction<\/a>, is the name of a content management system that aims particularly at document security. It removes active content from the document, making it impossible to exploit.<\/li>\n<\/ul>\n<h2>Patch CVE-2023-36884<\/h2>\n<p><strong>Microsoft still needs to release a patch<\/strong> for CVE-2023-36884. This section will be updated as more information becomes available. However, even after a patch is found, it pays to be cautious, watch your every move on the Internet, and <a href=\"https:\/\/gridinsoft.com\/zero-trust\">always follow the Zero Trust rule<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On July 11, 2023, Microsoft published an article about addressing the CVE-2023-36884 vulnerability. This breach allowed for remote code execution in Office and Windows HTML. Microsoft has acknowledged a targeted attack that exploits a vulnerability using specifically designed Microsoft Office documents. The attacker can gain control of a victim&#8217;s computer by creating a malicious Office [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":15996,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[17,15],"tags":[257,94,510,65,374],"class_list":{"0":"post-15957","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-labs","8":"category-security-news","9":"tag-0-day","10":"tag-microsoft","11":"tag-russia","12":"tag-ukraine","13":"tag-vulnerability"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/GS_Blog_banner_Microsoft-CVE-2023-36884-Vulnerability-Exploited-in-the-Wild_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/15957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=15957"}],"version-history":[{"count":17,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/15957\/revisions"}],"predecessor-version":[{"id":16008,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/15957\/revisions\/16008"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/15996"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=15957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=15957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=15957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}