Common Information
Type | Value |
---|---|
Value |
Add-ins - T1137.006 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may abuse Microsoft Office add-ins to obtain persistence on a compromised system. Office add-ins can be used to add functionality to Office programs. (Citation: Microsoft Office Add-ins) There are different types of add-ins that can be used by the various Office products; including Word/Excel add-in Libraries (WLL/XLL), VBA add-ins, Office Component Object Model (COM) add-ins, automation add-ins, VBA Editor (VBE), Visual Studio Tools for Office (VSTO) add-ins, and Outlook add-ins. (Citation: MRWLabs Office Persistence Add-ins)(Citation: FireEye Mail CDS 2018) Add-ins can be used to obtain persistence because they can be set to execute code when an Office application starts. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-07 | 0 | How Do I Open Access in Safe Mode? Quick & Easy Guide | ||
Details | Website | 2024-09-06 | 1 | Microsoft Office 2024 to disable ActiveX controls by default | ||
Details | Website | 2024-09-03 | 13 | Vulnerabilities in Microsoft apps for macOS allow stealing permissions | ||
Details | Website | 2024-08-19 | 48 | How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions | ||
Details | Website | 2024-05-15 | 45 | To the Moon and back(doors): Lunar landing in diplomatic missions | ||
Details | Website | 2023-11-20 | 3 | Are DarkGate and PikaBot the New QakBot? | Cofense | ||
Details | Website | 2023-11-01 | 1 | Latest RAT attack surge bypasses Microsoft's XLL block | ||
Details | Website | 2023-10-31 | 1 | Malware 'meal kits' give attackers the ingredients to bypass detection | ||
Details | Website | 2023-10-31 | 0 | HP Wolf Security Threat Insights Report Q3 2023 | HP Wolf Security | ||
Details | Website | 2023-10-22 | 1 | How to Fix Outlook Error Code _0x80070021 | ||
Details | Website | 2023-10-05 | 14 | Qakbot-affiliated actors distribute Ransom Night malware despite infrastructure takedown | ||
Details | Website | 2023-09-18 | 85 | Hibernating Qakbot: A Comprehensive Study and In-depth Campaign Analysis | ||
Details | Website | 2023-06-08 | 34 | 2022 Activities Summary of SectorJ groups (ENG) – Red Alert | ||
Details | Website | 2023-05-31 | 20 | Upping the Ante: Detecting In-Memory Threats with Kernel Call Stacks — Elastic Security Labs | ||
Details | Website | 2023-05-02 | 2 | In this update, we share with you the main developments from April | ||
Details | Website | 2023-05-02 | 54 | Polish Healthcare Industry Targeted by Vidar Infostealer Likely Linked to Djvu Ransomware | ||
Details | Website | 2023-04-29 | 83 | Bluepurple Pulse: week ending April 30th | ||
Details | Website | 2023-04-22 | 3 | LetsDefend: Malicious Document Analysis with REMnux | ||
Details | Website | 2023-04-17 | 2 | Microsoft Products as an Attack Vector | ||
Details | Website | 2023-04-08 | 1 | DoNotSpy11 comes to Windows 11 22H2 Moment 2, Windows 10 22H2 | ||
Details | Website | 2023-04-05 | 14 | Shaking The Foundation of An Online Collaboration Tool: Microsoft 365 Top 5 Attacks vs the CIS Microsoft 365 Foundation Benchmark | ||
Details | Website | 2023-04-03 | 0 | Microsoft OneNote Starts Blocking Dangerous File Extensions | ||
Details | Website | 2023-03-01 | 8 | Introducing Aladdin - LRQA Nettitude Labs | ||
Details | Website | 2023-02-21 | 23 | Your Office Document is at Risk - XLL, A New Attack Vector | ||
Details | Website | 2023-02-03 | 1 | Post-Macro World Sees Rise in Microsoft OneNote Documents Delivering Malware |