Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Malicious Microsoft Word Documents Exploiting CrowdStrike Bug to Spread Malware
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Malicious Microsoft Word Documents Exploiting CrowdStrike Bug to Spread Malware
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » Malicious Microsoft Word Documents Exploiting CrowdStrike Bug to Spread Malware

Security

Malicious Microsoft Word Documents Exploiting CrowdStrike Bug to Spread Malware

Threat actors are leveraging a CrowdStrike BSOD bug by distributing malicious Microsoft Word documents that download an information stealer via a malicious macro.

Marco Rizal
Last updated: August 21, 2024 9:54 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
Malicious Microsoft Word Documents Exploiting CrowdStrike BSOD Bug to Spread Malware
SHARE

ThreatLabz has reported that hackers are taking advantage of a vulnerability in CrowdStrike to distribute malware through a counterfeit Microsoft Word file.

The document claims to provide assistance in resolving the bug, but in reality, it contains malicious code.

When users open it and enable macros, it downloads a harmful information-stealing program from the internet.

The malicious document appears to offer instructions on resolving a Blue Screen of Death (BSOD) issue that stems from a CrowdStrike bug.

image 101
Credits: ThreatLabz

However, there is a concealed macro within the document, which is essentially a small program that activates when the document is opened with macros enabled.

Here's a detailed breakdown of what the macro does:

Setting Up Variables: The macro sets up various variables to store paths for temporary files and URLs for downloading the malware. The file names, like curl.txt, curl.exe, mscorsvc.txt, and mscorsvc.dll, are deliberately selected to appear innocuous and seamlessly integrate with genuine system files.

Building Commands: The macro creates a set of commands that can be executed in the Windows command prompt (cmd.exe). These commands rely on two utilities: certutil and curl.

  • certutil is typically used for handling certificates but can also decode files.
  • curl is used to download files from the internet.
  • Together, these tools download, decode, and store the malware on the user's system.

Executing Commands: The macro utilizes WScript.Shell to execute the command string it has constructed. The downloaded malware is able to run on the computer.

Cleaning Up: Once the malware is activated, the macro tries to get rid of the downloaded files such as curl.exe and curl.txt. This cleanup step aims to eliminate any traces of the attack, making it more challenging for users and security software to identify the incident.

⚠️Threat actors are taking advantage of the CrowdStrike BSOD bug to spread malware. ThreatLabz identified a lure that uses a Microsoft Word document that contains instructions on how to recover from the issue. However, the document contains a malicious macro that, when enabled,… pic.twitter.com/Yq31eOhfKF

— Zscaler ThreatLabz (@Threatlabz) July 22, 2024

After the malware is downloaded and executed, it starts to pilfer information from the compromised computer.

The stolen data is transmitted to the hacker's server via HTTP POST requests to the IP address 172.104.160[.]126:5000. This technique allows hackers to discreetly obtain stolen information without arousing suspicion.

The hackers employ various techniques to conceal their activities. They make their commands appear normal by utilizing legitimate tools such as certutil and curl.

They also employ techniques such as string concatenation to make their code more difficult to detect. These methods allow them to bypass security software.

More Stories

BitcoinIRA Security Flaw Allows Hacker to Take Over User Accounts

Largest FIN7 Malware Campaign Targets Global Companies Across 4000 Domains

Hackers Want Your Car, Too: Why Smart Cars Are Basically Computer On Wheels

$10 Million Bounty on GRU Cyber Operatives

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Two Thirds of The Internet Is a Bot Playground

Two-Thirds of The Internet Is a Bot Playground

Hackers Can Use Screen Noise to Steal Data on Air Gapped PCs

Hackers Can Use Screen Noise to Steal Data on Air-Gapped PCs

AI Researcher Created AI Ex Girlfriend After Heartbreak

AI Researcher Created “AI Ex-Girlfriend” After Heartbreak

ChatGPT Accounts Are the New Gold Rush for Hackers

ChatGPT Accounts Are the New Gold Rush for Hackers

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?