When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

'Zusy' malware spreads just by hovering over a hyperlink in a malicious PowerPoint file

Just last month, security researchers discovered subtitle files with malicious code that could potentially give attackers complete control over any device that loaded them – be it a PC, a Smart TV, or a phone. The exploit was quickly patched by Kodi and other popular media players.

Ingenuity, however, has no bounds; this week, a new variant of the “Zusy” (also known Gootkit or OTLARD) malware was discovered within spam emails spreading across Europe, the Middle East, and Africa.

What’s interesting is that the malware does not rely on traditional ways of infecting a system via macros or other scripts. Instead, all it takes is the hover of a mouse cursor over a hyperlink inside a malicious PowerPoint file.

As described by SentinelOne, the malicious PowerPoint file is where most of the magic happens. Once opened, the file displays but one slide with the text “Loading…Please Wait” that’s hyperlinked. If the user hovers their mouse cursor over this link, PowerPoint executes Windows PowerShell with a script that proceeds to download the actual malware.

'Enable All' is really not recommended

Thankfully, PowerPoint does not execute this program without user consent. Sadly, all it takes to skip this security notice (seen above) is a little bit of impatience on the user’s part. It also does not appear if Protected View is disabled, a feature that was added with Office 2010.

Office 365 users can also be targeted, but the malicious PowerPoint file does not work if it is opened via PowerPoint Online, as the web version does not have the functionality to execute code on a user’s machine. This trick doesn't work with PowerPoint Viewer either, as it also lacks the feature.

As noted by Dodge This Security, the malware appears to set up a backdoor to establish an RDP connection to the infected computer, giving attackers complete access to the system:

“I sandboxed the payload for 8 hours but no threat actors connected to the system. So I was unable to see what other purpose the backdoor might have if the threat actors had taken specific interest in the system.” [sic]

Since the malicious PowerPoint file is distributed via a spam campaign, it could potentially reach a large number of Office users across the world. These emails appear to contain a pattern in their subject line as well, by using transactional phrases like “Purchase Order” or “Confirmation” followed by a serial number. Trend Micro notes that this could be the perpetrators attempting to track "the spam messages that they send."

Source and Images: Trend Micro, Dodge This Security, SentinelOne via ArsTechnica

Report a problem with article
Next Article

7 Days: A week of Apple's developer conference, Amazon's Fire and Ice, and Scorpio's S

Previous Article

Google updates its support timeline for Pixel and Nexus devices

Join the conversation!

Login or Sign Up to read and post a comment.

15 Comments - Add comment