Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
overview
A remote code execution (RCE) vulnerability exists in Microsoft Office and Windows HTML. The vulnerability is tracked as CVE-2023-36884 and is being exploited by the Russian threat actor Storm-0978 (also known as RomCom). The group is using the vulnerability in a phishing campaign that targets defense organizations, as well as government organizations in Europe and North America.
Storm-0978 is deploying a backdoor called RomCom via Windows documents with themes relevant to the Ukrainian World Congress. Storm-0978 specializes in opportunistic ransomware, extortion, and targeted credential-stealing campaigns possibly linked to intelligence activities. According to Microsoft, ransomware attacks have been identified in the telecommunications and financial industries, among others.
Although Microsoft has not issued a patch for CVE-2023-36884 they have provided recommendations on how organizations can protect themselves:
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION
If you haven't already done so, please refer to Microsoft's recommendations and implement them immediately. According to Microsoft's advisory, the CVE will be regularly updated with additional information and links to security updates as soon as they are released.
INDICATORS OF COMPROMISE (IoCs)
Microsoft Defender for Endpoint - Microsoft’s advisory states that alerts with the following title(s) in the security center can indicate activity on your network: Emerging threat activity group Storm-0978 detected.
Avertium’s Capability Development Team found several detections for activity related to Storm-0978/RomCom.
Please Note: These detections could have a high volume of false positives if script interpreters or shell processes are launched as part of normal activity. I.e., Excel being used to launch PowerShell to gather live data.
Suspicious Microsoft Office Child Process |
Detects a suspicious process spawning from one of the Microsoft Office suite products. |
Microsoft Office spawning script interpreter |
Detects when an office application is attempting to spawn a script interpreter. |
SUPPORTING DOCUMENTATION