Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Malicious Microsoft Word Documents Exploiting CrowdStrike Bug to Spread Malware
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Malicious Microsoft Word Documents Exploiting CrowdStrike Bug to Spread Malware
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » Malicious Microsoft Word Documents Exploiting CrowdStrike Bug to Spread Malware

Security

Malicious Microsoft Word Documents Exploiting CrowdStrike Bug to Spread Malware

Threat actors are leveraging a CrowdStrike BSOD bug by distributing malicious Microsoft Word documents that download an information stealer via a malicious macro.

Marco Rizal
Last updated: August 21, 2024 9:54 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
Malicious Microsoft Word Documents Exploiting CrowdStrike BSOD Bug to Spread Malware
SHARE

ThreatLabz has reported that hackers are taking advantage of a vulnerability in CrowdStrike to distribute malware through a counterfeit Microsoft Word file.

The document claims to provide assistance in resolving the bug, but in reality, it contains malicious code.

When users open it and enable macros, it downloads a harmful information-stealing program from the internet.

The malicious document appears to offer instructions on resolving a Blue Screen of Death (BSOD) issue that stems from a CrowdStrike bug.

image 101
Credits: ThreatLabz

However, there is a concealed macro within the document, which is essentially a small program that activates when the document is opened with macros enabled.

Here's a detailed breakdown of what the macro does:

Setting Up Variables: The macro sets up various variables to store paths for temporary files and URLs for downloading the malware. The file names, like curl.txt, curl.exe, mscorsvc.txt, and mscorsvc.dll, are deliberately selected to appear innocuous and seamlessly integrate with genuine system files.

Building Commands: The macro creates a set of commands that can be executed in the Windows command prompt (cmd.exe). These commands rely on two utilities: certutil and curl.

  • certutil is typically used for handling certificates but can also decode files.
  • curl is used to download files from the internet.
  • Together, these tools download, decode, and store the malware on the user's system.

Executing Commands: The macro utilizes WScript.Shell to execute the command string it has constructed. The downloaded malware is able to run on the computer.

Cleaning Up: Once the malware is activated, the macro tries to get rid of the downloaded files such as curl.exe and curl.txt. This cleanup step aims to eliminate any traces of the attack, making it more challenging for users and security software to identify the incident.

⚠️Threat actors are taking advantage of the CrowdStrike BSOD bug to spread malware. ThreatLabz identified a lure that uses a Microsoft Word document that contains instructions on how to recover from the issue. However, the document contains a malicious macro that, when enabled,… pic.twitter.com/Yq31eOhfKF

— Zscaler ThreatLabz (@Threatlabz) July 22, 2024

After the malware is downloaded and executed, it starts to pilfer information from the compromised computer.

The stolen data is transmitted to the hacker's server via HTTP POST requests to the IP address 172.104.160[.]126:5000. This technique allows hackers to discreetly obtain stolen information without arousing suspicion.

The hackers employ various techniques to conceal their activities. They make their commands appear normal by utilizing legitimate tools such as certutil and curl.

They also employ techniques such as string concatenation to make their code more difficult to detect. These methods allow them to bypass security software.

More Stories

Nissan Dubai Hit by Cyberattack, 50GB of Data at Risk

Southeast Asia’s Fortune 500 Companies Struggle with Basic Email Security

Russian-Linked Crypto Scammers Are Targeting The 2024 US Election

Bitcoin’s DoS Vulnerability Lets Hackers Crash Miners For Less Than 1% of a Block

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Grayscale Dogecoin ETF Makes Historic NYSE Trading Debut

November 24, 2025

Breaking: FBI Probes Cardano Network Split After Malicious Transaction

November 24, 2025

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

You might also like

A Look Inside the Pig Butchering Crypto Scam Exchanges

A Look Inside the Pig Butchering Crypto Scam Exchanges

New Cyberattack Targets Industrial Automation Sector with Malware

New Cyberattack Targets Industrial Automation Sector with Malware

Perfctl Malware Exploits Dockers Wide Open Remote API Servers

Perfctl Malware Exploits Docker’s Wide-Open Remote API Servers

9 iPhone Settings to Turn Off for Maximum Privacy

9 iPhone Settings to Turn Off for Maximum Privacy

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?