Category: Microsoft|Jul 31, 2024 | Author: Admin

New Specula tool uses Outlook for remote code execution in Windows

Share on

Microsoft Outlook can be turned into a C2 beacon to execute code remotely, as demonstrated by a new red team post-exploitation framework named "Specula," released today by cybersecurity firm TrustedSec.

New Specula tool uses Outlook for remote code execution in Windows

This C2 framework works by creating a custom Outlook Home Page using WebView by exploiting CVE-2017-11774, an Outlook security feature bypass vulnerability patched in October 2017.

 

"In a file-sharing attack scenario, an attacker could provide a specially crafted document file designed to exploit the vulnerability, and then convince users to open the document file and interact with the document," Microsoft says.

 

However, even though Microsoft patched the flaw and removed the user interface to show Outlook home pages, attackers can still create malicious home pages using Windows Registry values, even on systems where the latest Office 365 builds are installed.

 

As Trusted explains, Specula runs purely in Outlook's context, and it works by setting a custom Outlook home page via registry keys that call out to an interactive Python web server.

 

To do that, non-privileged threat actors can set a URL target in Outlook's WebView registry entries under HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\WebView\ to an external website under their control.

 

 Outlook Specula registry value (TrustedSec)
The attacker-controlled Outlook home page is designed to serve custom VBscript files that an attacker can use to execute arbitrary commands on compromised Windows systems.

 

"TrustedSec has been able to leverage this specific channel for initial access in hundreds of clients despite the existing knowledge and preventions available for this technique," TrustedSec said.

 

"When a custom home page is set by any of the Registry keys outlined by Microsoft in their workaround, Outlook will download and display that HTML page instead of the normal mailbox element (inbox, calendar, sent, etc.) when the associated tab is selected.

 

"From the downloaded HTML page we're able to run vbscript or JScript within a privileged context with more or less full access to the local system as if we were running cscript/wscript.exe."

 

While a device first needs to be compromised to configure the Outlook Registry entry, once configured, attackers can use this technique for persistence and to spread laterally to other systems.

 

Since outlook.exe is a trusted process, it makes it easier for attackers to evade existing software as commands are executed.

 

As U.S. Cyber Command (US CyberCom) warned five years ago, the CVE-2017-11774 Outlook vulnerability was also used to target U.S. government agencies.

 

Security researchers from Chronicle, FireEye, and Palo Alto Networks later linked these attacks to the Iranian-sponsored APT33 cyber espionage group.

 

"FireEye first observed APT34 use CVE-2017-11774 in June 2018, followed by adoption by APT33 for a significantly broader campaign beginning in July 2018 and continuing for at least a year," FireEye cybersecurity researchers said at the time.

Sponsored Ads:

Comments:


Microsoft-365-headpic-24-04-25.png

Microsoft blocks ActiveX by default in Microsoft 365, Office 2024

Category: Microsoft|Apr 24, 2025 | Author: Admin
logo.png

Microsoft Exchange 2016 and 2019 reach end of support in six months

Category: Microsoft|Apr 23, 2025 | Author: Admin
android-22-04-25.png

Google adds Android auto-reboot to block forensic data extractions

Category: Google|Apr 22, 2025 | Author: Admin
Outlook-21-04-25.png

Microsoft warns of CPU spikes when typing in classic Outlook

Category: Microsoft|Apr 21, 2025 | Author: Admin
hertz-sign-20-04-25.png

Hertz confirms customer info, drivers' licenses stolen in data breach

Category: General|Apr 20, 2025 | Author: Admin
hacker-19-04-25.png

Cybersecurity firm buying hacker forum accounts to spy on cybercriminals

Category: IT|Apr 19, 2025 | Author: Admin
padlock-18-04-25.png

SSL/TLS certificate lifespans reduced to 47 days by 2029

Category: IT|Apr 18, 2025 | Author: Admin
RAT-17-04-25.png

New ResolverRAT malware targets pharma and healthcare orgs worldwide

Category: IT|Apr 17, 2025 | Author: Admin
DaVita-sign-16-04-25.png

Kidney dialysis firm DaVita hit by weekend ransomware attack

Category: General|Apr 16, 2025 | Author: Admin
Exchange_headpic-15-04-25.png

Microsoft Exchange 2016 and 2019 reach end of support in six months

Category: Microsoft|Apr 15, 2025 | Author: Admin
Meta-14-04-25.png

Meta to resume AI training on content shared by Europeans

Category: IT|Apr 14, 2025 | Author: Admin
ChatGPT-headpic-13-04-25.png

Leak confirms OpenAI's GPT 4.1 is coming before GPT 5.0

Category: IT|Apr 13, 2025 | Author: Admin
microsoft-365-malicious-email-12-04-15.png

Tycoon2FA phishing kit targets Microsoft 365 with new tricks

Category: Microsoft|Apr 12, 2025 | Author: Admin
Google_flare-11-04-25.png

Google's AI video generator Veo 2 is rolling out on AI Studio

Category: Google|Apr 11, 2025 | Author: Admin
ChatGPT-10-04-25.png

OpenAI wants ChatGPT to know you over your life with new Memory update

Category: IT|Apr 10, 2025 | Author: Admin
more