Ancient Microsoft Word Exploit Unleashes Cyber Mayhem on Taiwanese Drone Makers

Attackers are using an old version of Microsoft Word to target Taiwanese drone makers. Dubbed “WordDrone,” this cyber espionage campaign leverages a DLL side-loading technique to install a persistent backdoor. Researchers discovered the attack while investigating strange processes in an ancient version of Microsoft Word.…

Hot Take:

Who knew that a throwback to Microsoft Word 2010 would be this season’s hottest trend in cyber espionage? Retro is back, baby, and it’s packing a malware punch!

Key Points:

  • Attackers are using an old version of Microsoft Word to deliver malware in a campaign dubbed “WordDrone.”
  • The attack targets Taiwanese drone makers, aiming at cyber espionage and disrupting military and satellite supply chains.
  • The attack involves a DLL side-loading technique to install a persistent backdoor called ClientEndPoint.
  • Researchers found similarities between this attack and a previous campaign called “TIDrone,” which also targeted Taiwanese drone makers.
  • The attackers exploit vulnerabilities in an ERP software popular among Taiwanese companies to gain initial access.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here