Office and Penetration Testing Software Are Increasingly Sources for Malware

Half of all malware that tried to infect computers during the third quarter of 2019 was already known. The other half was "zero-day" malware, which bypassed (and therefore went undetected by) traditional signature-based security software. On the list of the top-10 malware attacks for the three-month period, WatchGuard Technologies identified several Apache Struts vulnerabilities, which the cybersecurity company identified as the same type of malware used in the Equifax data breach. A report on WatchGuard's findings also highlighted an increase in the use of Microsoft Office exploits as well as "legitimate penetration testing tools" for delivering computer infections.

The bulk of the content for the latest "Internet Security Report" is generated and collected by willing participants using the company's products, including its Firebox firewall appliances and software, and DNS-level protection services.

Among the many findings shared in the report are these:

  • Overall network attacks rose by 8 percent quarter over quarter, the company found. Among them was the Apache Struts 2 Remote Code Execution (the one that hit Equifax), which allows attackers to install Python or make a custom HTTP request to exploit the vulnerability "with just a few lines of code and obtain shell access to an exposed system." Two additional Apache Struts were also on the top-10 list. As the security researchers pointed out, the continued use of this vulnerability "should serve as a reminder of how important it is for web admins to patch known flaws as soon as possible."

  • Also on the list: two malware flavors that hit Office products. Both were delivered via email, the report noted, pointing up the importance of training users in the art of being able to identify phishing attempts and potentially malicious attachments.

  • Two newly identified malware flavors incorporated penetration testing tools: Boxter, a "PowerSploit" script; and Hacktool.JQ, a password stealer. What researchers couldn't determine was whether these were being used by legitimate hackers for the purposes of testing enterprise networks or by cyber criminals "leveraging readily available open source tools."

  • Among top compromised websites was one legitimate site (an Arabic platform) for sharing photos and links, which also hosted "malicious payloads." While the site validates the file extension when accepting an image, it doesn't go beyond that, which means attackers can change the file extension to something friendly while uploads still carry malware that's activated when the files are clicked.

  • The dramatic increase in zero-day malware instances (up to 50 percent from 38 percent over the last several quarters) pointed up the need for a layered security approach that could use multiple services to defend against "advanced, ever-evolving threats."

"Our latest threat intelligence showcases the variability and sophistication of cyber criminals' growing playbook. Not only are they leveraging notorious attacks, but they're launching evasive malware campaigns and hijacking products, tools and domains we use every day," said Corey Nachreiner, the company's chief technology officer, in a statement. "As threat actors continue to modify their tactics, organizations of every size must protect themselves, their customers and their partners with a set of layered security services that cover everything from the core network to endpoints to the users themselves."

The security report, with more detailed findings, is available with registration on the WatchGuard website.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • robot typing on a computer

    Microsoft Unveils 'Computer Use' Automation in Copilot Studio

    Microsoft has announced a new AI-powered feature called "computer use" for its Copilot Studio platform that allows agents to directly interact with Web sites and desktop applications using simulated mouse clicks, menu selections and text inputs.

  • AI microchip under cybersecurity attack, surrounded by symbols of threats like a skull, spider, lock, and warning shield

    Report Finds Agentic AI Protocol Vulnerable to Cyber Attacks

    A new report from Backslash Security has identified significant security vulnerabilities in the Model Context Protocol (MCP), technology introduced by Anthropic in November 2024 to facilitate communication between AI agents and external tools.

  • educators seated at a table with a laptop and tablet, against a backdrop of muted geometric shapes

    HMH Forms Educator Council to Inform AI Tool Development

    Adaptive learning company HMH has established an AI Educator Council that brings together teachers, instructional coaches and leaders from school district across the country to help shape its AI solutions.

  • illustration of a human head with a glowing neural network in the brain, connected to tech icons on a cool blue-gray background

    Meta Introduces Stand-Alone AI App

    Meta Platforms has launched a stand-alone artificial intelligence app built on its proprietary Llama 4 model, intensifying the competitive race in generative AI alongside OpenAI, Google, Anthropic, and xAI.