02 Jun 2017

Microsoft Zero Day Attack

We are writing to inform all microsoft® office users of a new zero-day attack that installs malware onto fully patched systems running microsoft’s operating system via an office vulnerability. We recommend refraining from sending or opening any word documents via email. Microsoft office has a feature called “protected view” that is enabled by default; however, you should double check your settings to make sure that this feature is turned on. If you do open a word document and see this pop up, it’s a pretty good indicator that something is wrong.

In addition to being highly suspicious of any word document that arrives in an email, there are a few other things we’d recommend that you consider:

  • warn your users, and let them know of the heightened risk related to this attack right now, so they’ll be better prepared if they receive an email with one of these attachments.
  • consider securing your email with our mimecastservice (if you have not done so already), which can mitigate the risk
  • or consider sharing documents through our collaboration service instead which can also mitigate the risk.

If you are managing your systems with active directory®, consider:

Temporarily enabling the group policy object (gpo) that disallows editing of flagged files. This means users will just have read-only protected view for any documents that microsoft recognizes as unsafe. Within trust centre, enable the gpo that uses file block to block .rtf files, not even allowing for them to be opened in “protected view”.

There is currently no patch for this bug, however Microsoft is expected to release a fix within its next round of security updates. Be on the lookout for communications from Microsoft around this matter

leave a comment

Make sure you enter the (*) required information where indicated. HTML code is not allowed.