Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Malicious Microsoft Word Documents Exploiting CrowdStrike Bug to Spread Malware
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Malicious Microsoft Word Documents Exploiting CrowdStrike Bug to Spread Malware
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » Malicious Microsoft Word Documents Exploiting CrowdStrike Bug to Spread Malware

Security

Malicious Microsoft Word Documents Exploiting CrowdStrike Bug to Spread Malware

Threat actors are leveraging a CrowdStrike BSOD bug by distributing malicious Microsoft Word documents that download an information stealer via a malicious macro.

Marco Rizal
Last updated: August 21, 2024 9:54 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
Malicious Microsoft Word Documents Exploiting CrowdStrike BSOD Bug to Spread Malware
SHARE

ThreatLabz has reported that hackers are taking advantage of a vulnerability in CrowdStrike to distribute malware through a counterfeit Microsoft Word file.

The document claims to provide assistance in resolving the bug, but in reality, it contains malicious code.

When users open it and enable macros, it downloads a harmful information-stealing program from the internet.

The malicious document appears to offer instructions on resolving a Blue Screen of Death (BSOD) issue that stems from a CrowdStrike bug.

image 101
Credits: ThreatLabz

However, there is a concealed macro within the document, which is essentially a small program that activates when the document is opened with macros enabled.

Here's a detailed breakdown of what the macro does:

Setting Up Variables: The macro sets up various variables to store paths for temporary files and URLs for downloading the malware. The file names, like curl.txt, curl.exe, mscorsvc.txt, and mscorsvc.dll, are deliberately selected to appear innocuous and seamlessly integrate with genuine system files.

Building Commands: The macro creates a set of commands that can be executed in the Windows command prompt (cmd.exe). These commands rely on two utilities: certutil and curl.

  • certutil is typically used for handling certificates but can also decode files.
  • curl is used to download files from the internet.
  • Together, these tools download, decode, and store the malware on the user's system.

Executing Commands: The macro utilizes WScript.Shell to execute the command string it has constructed. The downloaded malware is able to run on the computer.

Cleaning Up: Once the malware is activated, the macro tries to get rid of the downloaded files such as curl.exe and curl.txt. This cleanup step aims to eliminate any traces of the attack, making it more challenging for users and security software to identify the incident.

⚠️Threat actors are taking advantage of the CrowdStrike BSOD bug to spread malware. ThreatLabz identified a lure that uses a Microsoft Word document that contains instructions on how to recover from the issue. However, the document contains a malicious macro that, when enabled,… pic.twitter.com/Yq31eOhfKF

— Zscaler ThreatLabz (@Threatlabz) July 22, 2024

After the malware is downloaded and executed, it starts to pilfer information from the compromised computer.

The stolen data is transmitted to the hacker's server via HTTP POST requests to the IP address 172.104.160[.]126:5000. This technique allows hackers to discreetly obtain stolen information without arousing suspicion.

The hackers employ various techniques to conceal their activities. They make their commands appear normal by utilizing legitimate tools such as certutil and curl.

They also employ techniques such as string concatenation to make their code more difficult to detect. These methods allow them to bypass security software.

More Stories

5 million Israelis got terrifying texts — Israel blames Iran and Hezbollah

This Nasty Malware Duo Is After Your Banking Apps

Sensitive Data of 13,000 Ukrainian Officials Leaked in Cyberattack

Deleted Diddy Tweets Are Being Used as Bait to Spread Malware

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Michigan County Restores 911 CAD System After Cyberattack

Michigan County Restores 911 CAD System After Cyberattack

Largest FIN7 Malware Campaign Targets Global Companies Across 4000 Domains

Largest FIN7 Malware Campaign Targets Global Companies Across 4000 Domains

GrimResource Malware Hits Chinese Government and Business Computers

GrimResource Malware Hits Chinese Government and Business Computers

Voldemorts New Spell Now Targets Taxpayers Instead

Voldemort’s New Spell Now Targets Taxpayers Instead

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?