News

“Evil Clippy” helps malicious MS Office documents bypass antiviruses

Cybersecurity researchers inhaled new life in famous helper from Microsoft Office that is famous as Clippy.

Evil Clippy” – this is how new instrument called – can significantly complicate detection of malware macros.

It is able to modify documents on the step of files formatting. Finally comes malware version of the document that can bypass detection with different antivirus engines. To get this result, new instrument uses undocumented functions and specifications.

Evil Clippy created by Danish company Outflank that tests cybersecurity. Instrument was developed when one of company’s clients was tested for the ability to resist cyberattacks.

Evil Clippy can work in Windows, macOS and Linux. Instrument supports formats Microsoft Office 97 – 2003 (.DOC и .XLS files), 2007 and newer (.DOCM и .XLSM files).

Evil Clippy mem

Technique that is used by the Evil Clippy for generation of malware documents is called VBA-stomping and was described by Walmart cybersecurity team. Its meaning is in substitution of the original VBA-script on “pseudocode”.

«Since malicious macros are one of the most common methods for initial compromise by threat actors, proper defense against such macros is crucial. We believe that the lack of adequate specifications of how macros actually work in MS Office severely hinders the work of antivirus vendors and security analysts. This post serves as a call to Microsoft to change this for the better.», – sais in Outflank

To avoid detection by antivirus products new infecting tool substitutes malware macros code by a fake script. As a result malware document that initially was detected by 30 antiviruses, could bypass majority of them with the use of Evil Clippy.

Recommendation:
If you don’t use macros, turn them off. If you need them, at least turn off macros in documents downloaded from the internet.

Source: https://nakedsecurity.sophos.com

Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Recent Posts

Qehu Virus Removal Guide (+Decrypt .qehu files)

Qehu - General Info Qehu is a destructive software functioning as typical ransomware. Michael Gillespie,…

1 day ago

Qepi Virus Removal Guide (+Decrypt .qepi files)

Qepi Virus - Details Qepi is a destructive software functioning as typical ransomware. Michael Gillespie,…

1 day ago

Remove Wifebaabuy.live pop-up ads (Virus Removal Guide)

Wifebaabuy.live is a domain that tries to trick you into clik to its browser notifications…

1 day ago

Remove Relativeads.net pop-up ads (Virus Removal Guide)

Relativeads.net is a domain that tries to force you into clik to its browser notifications…

1 day ago

Remove Vamtoa pop-up ads (Virus Removal Guide)

Vamtoacm.com is a domain that tries to force you into clik to its browser notifications…

1 day ago

Remove Clicks2apk pop-up ads (Virus Removal Guide)

Clicks2apk.com is a site that tries to force you into subscribing to its browser notifications…

1 day ago