Home
%3CLINGO-SUB%20id%3D%22lingo-sub-134105%22%20slang%3D%22en-US%22%3EOffice%20365%20ATP%20defense%20for%20corporate%20networks%20against%20recent%20Office%20exploit%20attacks%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-134105%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20Office%20365%20Threat%20Research%20team%20has%20seen%20an%20uptick%20in%20the%20use%20of%20Office%20exploits%20in%20attacks%20across%20various%20industry%20sectors%20in%20recent%20months.%20In%20this%20blog%2C%20we%20will%20review%20several%20of%20these%20exploits%2C%20including%20a%20group%20of%20Office%20moniker%20exploits%20that%20attackers%20have%20used%20in%20targeted%20as%20well%20as%20crimeware%20attacks.%20We%20will%20also%20describe%20the%20payloads%20associated%20with%20these%20exploits%20and%26nbsp%3Bhighlight%20our%20research%20into%20a%20particularly%20sophisticated%20piece%20of%20malware.%20Finally%2C%20we%20will%20demonstrate%20how%20%3CA%20title%3D%22Office%20365%20Advanced%20Threat%20Protection%22%20href%3D%22https%3A%2F%2Fproducts.office.com%2Fen-us%2Fexchange%2Fonline-email-threat-protection%3Focid%3Dcx-blog-mmpc%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EOffice%20365%20Advanced%20Threat%20Protection%3C%2FA%3E%2C%20%3CA%20title%3D%22Windows%20Defender%20Advanced%20Threat%20Protection%22%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fwindowsforbusiness%2Fwindows-atp%3Focid%3Dcx-blog-mmpc%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EWindows%20Defender%20Advanced%20Threat%20Protection%3C%2FA%3E%2C%20and%20%3CA%20title%3D%22Windows%20Defender%20Exploit%20Guard%22%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fmmpc%2F2017%2F10%2F23%2Fwindows-defender-exploit-guard-reduce-the-attack-surface-against-next-generation-malware%2F%3Focid%3Dcx-blog-mmpc%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EWindows%20Defender%20Exploit%20Guard%20%3C%2FA%3Eprotect%20customers%20from%20these%20exploits.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20the%20full%20article%20please%20go%20to%3A%20%3CA%20href%3D%22https%3A%2F%2Fcloudblogs.microsoft.com%2Fmicrosoftsecure%2F2017%2F11%2F21%2Foffice-365-advanced-threat-protection-defense-for-corporate-networks-against-recent-office-exploit-attacks%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fcloudblogs.microsoft.com%2Fmicrosoftsecure%2F2017%2F11%2F21%2Foffice-365-advanced-threat-protection-defense-for-corporate-networks-against-recent-office-exploit-attacks%2F%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

The Office 365 Threat Research team has seen an uptick in the use of Office exploits in attacks across various industry sectors in recent months. In this blog, we will review several of these exploits, including a group of Office moniker exploits that attackers have used in targeted as well as crimeware attacks. We will also describe the payloads associated with these exploits and highlight our research into a particularly sophisticated piece of malware. Finally, we will demonstrate how Office 365 Advanced Threat Protection, Windows Defender Advanced Threat Protection, and Windows Defender Exploit Guard protect customers from these exploits.

 

For the full article please go to: https://cloudblogs.microsoft.com/microsoftsecure/2017/11/21/office-365-advanced-threat-protection-de...