Microsoft Office Vulnerability Most Common Hacker Target

Malicious attachment launches provides the ability to deploy further malware

By By Dan Hounsell


As healthcare systems continue strengthening IT security against cyber attacks and the federal government issues guidance to support their efforts, information is emerging about the most common targets of hackers looking for valuable patient data and other information.

The most frequent exploit in the last three months caught by HP Sure Click was against an older, unpatched memory corruption vulnerability in Microsoft Office, accounting for nearly 75 percent of all exploits in the fourth quarter of 2020, according to a recent threat insights report from HP Bromium as reported by Health IT Security.

CVE-2017-11882, found in Equation Editor, is a memory-corruption vulnerability that can allow an attacker to execute remote code on vulnerable devices after the victim opens a malicious document typically sent in a phishing email. The malicious attachment launches the exploit and provides the ability to deploy further malware. Microsoft has provided a software update to eliminate the risk, but these unpatched systems are leaving the door open to attacks.



March 19, 2021


Topic Area: Information Technology


Recent Posts

UF Health Hospitals Rely on Green Globes to Realize Their Full Potential

Case study: The process encouraged the team to push themselves in several areas.


How Healthcare Facilities Can Be Truly Disaster-Resilient

Real resilience looks different than what’s written down in plans


TriasMD Breaks Ground on DISC Surgery Center for San Fernando Valley

It is set to open in Q3 2025


Bigfork Valley Hospital Falls Victim to Data Breach

The incident occurred in November 2024


AI-Driven Facilities: Strategic Planning and Cost Management 

6 factors to ensure infrastructure, operations and financial management support AI’s integration


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.