Microsoft Office susceptible to homograph attacks
is the headline of the news that the author of WTM News has collected this article. Stay tuned to WTM News to stay up to date with the latest news on this topic. We ask you to follow us on social networks.
It is already a reality, all Microsoft Office applications are susceptible to homograph phishing attacks that use internationalized domain names. This is revealed by the new Bitdefender research.
The names used by MS Office (including Outlook, Word, Excel, OneNote, and PowerPoint) are virtually unrecognizable to the user, which makes the probability of clicking on a malicious link extremely high.
Microsoft Office susceptible to attack
Although homograph attacks are unlikely to become widespread, as they are not easy to set up and maintain, they are a dangerous and effective tool used for campaigns based on advanced persistent threats (APTs) or other high-level techniques.
Microsoft Office applications susceptible to homograph attacks
These campaigns seek specific targets that provide significant value, whether they are specific companies, such as banks, or specific activities, such as the exchange of cryptocurrencies.
Security advice
The company urges companies to be alert and take different measures:
- Include information about homograph attacks in training and awareness activities for your employees.
- Implement an endpoint security solution that detects and blocks malicious websites.
- Use IP and URL reputation services on all your devices.