Firewall Daily

Hackers Use Graphite Malware to Exploit PowerPoint Mouseover

A new hacker collective is on the rise with its unique way to infiltrate using a PowerPoint feature. The hacker group was identified as Russian state-sponsored “APT28” and is said to be using a new code execution method that leverages the mouse movement in Microsoft PowerPoint to deploy malware via decoyed documents.

According to sources, the mouse movement triggers a backdoor action when the user starts the presentation mode on PowerPoint. The code execution employed in the campaign, according to the Cluster25 researchers, executes a PowerShell script that automatically downloads and launches a dropper from Microsoft OneDrive.

The drop initially appears to be a typical image file with a standard image extension. However, upon opening, it functions like a pathway for a payload. The threat actor then leads the victim to Graphite malware, which uses Microsoft Graph API and OneDrive for command-and-control (C2) communications to retrieve additional payloads.

Researchers explain Graphite malware campaign

Once the victim uses a premade template on PowerPoint, the malware links it back to the Organization for Economic Co-operation and Development (OECD), a Paris-based intergovernmental entity.

The two URLs used by the attackers, which were utilized in a campaign in August and September, were examined by Cluster25 researchers. The investigation revealed that the hackers had begun the groundwork in early 2022 and over the past two months, they have expanded their operations while continuing to run the campaign. The threat actors have mainly targeted organizations and individuals in the government and defense sectors across Europe and Eastern Europe.

The hacker collective dropped the backdoor in their initial attacks by taking advantage of the MSHTML remote code execution vulnerability (CVE-2021-40444). They ran their campaigns in late 2021 and early 2022, deploying the malware in January 2022 to initiate a similar attack.

The group goes by several identities, including the well-known APT28 and Fancy Bear and is becoming an A-grade threat to businesses as it keeps expanding its influence in underground hacking forums. The threat group is expected to use new exploitation techniques as it develops its technical spectrum to carry on its operations within industries and organizations aside from those it has already infiltrated.

thecyberexpress

Recent Posts

The Cyber Express Weekly Roundup: AI Disruption, Regulatory Pressure, and the Evolving Cyber Threat Landscape

AI fraud, deepfake probes, SME cyber warnings, and ransomware cases highlight rising global risks in this week’s Cyber Express roundup.

3 days ago

French National Bank Authority Breach Exposed 1.2 Million Accounts

French national bank authority confirmed a major data breach affecting 1.2 million bank accounts after a malicious actor stole credentials…

3 days ago

What Big Tech Leaders Said On AI’s Future at India AI Impact Summit 2026

The real success of AI will not only depend on how powerful the technology becomes, but on how safely, fairly,…

3 days ago

Two Petabytes Worth Data of Israeli’s Siphoned, Says Cyber Head

Israel data breach totals two petabytes, with phishing up 35% and cyber influence attacks rising 170%, says Yossi Karadi.

3 days ago

Cyberattack Forces Clinic Closures, Surgery Cancellations at University of Mississippi Medical Center

The UMMC cyberattack halted surgeries, closed clinics statewide and triggered a federal probe into potential patient data exposure.

3 days ago

First Android Malware Weaponizes Gemini AI to Evade Detection, Maintain Persistence

ESET researchers discovered PromptSpy, the first known Android malware to integrate generative AI directly into its execution flow, marking a…

4 days ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More