{"id":577,"date":"2019-08-09T09:09:53","date_gmt":"2019-08-09T16:09:53","guid":{"rendered":"https:\/\/www.karlstechnology.com\/blog\/?p=577"},"modified":"2019-08-09T09:09:55","modified_gmt":"2019-08-09T16:09:55","slug":"new-trojan-malware-through-word","status":"publish","type":"post","link":"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/","title":{"rendered":"New Trojan Malware through Word"},"content":{"rendered":"\n<p>New phishing emails that contain trojan malware are spreading, according to experts. The malware, named Ursnif, is contained in Word documents through emails and allow cyber hackers to steal personal credentials. <\/p>\n\n\n\n<p>Ursnif isn&#8217;t the first of its kind, however. It was reported that this particular variant has been around since 2007 and specifically targets Windows OS. <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/ursnif-variant-spreading-word-document.html\">Fortinet, a top-rated security platform<\/a>, recently stated this threat to be highly active.<\/p>\n\n\n\n<p><em>&#8220;When a victim opens the Word document, it displays a security warning message designed to protect MS Word users from malicious macros (VBA code). \u00a0However, the document content deceives victims to click the \u201cEnable Content\u201d button, as shown in Figure 1. When the button is clicked, the malicious VBA code is executed because the code is in an AutoOpen sub that is executed at opening the document.&#8221;<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"899\" height=\"572\" src=\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/08\/image.img_.png\" alt=\"\" class=\"wp-image-578\" srcset=\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/08\/image.img_.png 899w, https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/08\/image.img_-300x191.png 300w, https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/08\/image.img_-768x489.png 768w, https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/08\/image.img_-624x397.png 624w\" sizes=\"(max-width: 899px) 100vw, 899px\" \/><figcaption>Source: fortinet.com &#8211; Figure 1<\/figcaption><\/figure>\n\n\n\n<p>It&#8217;s highly advised that you do not open any documents through e-mails unless you know exactly who it is from. Be sure to double check the address it was sent from as well. Many times, the name will show up legit, but the email address itself does not match. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>New phishing emails that contain trojan malware are spreading, according to experts. The malware, named Ursnif, is contained in Word documents through emails and allow cyber hackers to steal personal credentials. Ursnif isn&#8217;t the first of its kind, however. It was reported that this particular variant has been around since 2007 and specifically targets Windows [&hellip;]<\/p>\n","protected":false},"author":22392,"featured_media":579,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[10,71,72],"class_list":["post-577","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computerrepair","tag-hack","tag-malware","tag-trojan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Trojan Malware through Word - Computer Repair Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Trojan Malware through Word - Computer Repair Blog\" \/>\n<meta property=\"og:description\" content=\"New phishing emails that contain trojan malware are spreading, according to experts. The malware, named Ursnif, is contained in Word documents through emails and allow cyber hackers to steal personal credentials. Ursnif isn&#8217;t the first of its kind, however. It was reported that this particular variant has been around since 2007 and specifically targets Windows [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Repair Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/karlstechnology\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-09T16:09:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-09T16:09:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/08\/My-Post-7.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristin Willis\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristin Willis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/\"},\"author\":{\"name\":\"Kristin Willis\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d\"},\"headline\":\"New Trojan Malware through Word\",\"datePublished\":\"2019-08-09T16:09:53+00:00\",\"dateModified\":\"2019-08-09T16:09:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/\"},\"wordCount\":195,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/08\/My-Post-7.png\",\"keywords\":[\"hack\",\"malware\",\"trojan\"],\"articleSection\":[\"Computer Repair\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/\",\"name\":\"New Trojan Malware through Word - Computer Repair Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/08\/My-Post-7.png\",\"datePublished\":\"2019-08-09T16:09:53+00:00\",\"dateModified\":\"2019-08-09T16:09:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/#primaryimage\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/08\/My-Post-7.png\",\"contentUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/08\/My-Post-7.png\",\"width\":1200,\"height\":629},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.karlstechnology.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Trojan Malware through Word\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#website\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/\",\"name\":\"Computer Repair Blog\",\"description\":\"Karls Technology Computer Repair\",\"publisher\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.karlstechnology.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\",\"name\":\"Karls Technology\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png\",\"contentUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png\",\"width\":800,\"height\":99,\"caption\":\"Karls Technology\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/karlstechnology\",\"https:\/\/x.com\/karlstechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d\",\"name\":\"Kristin Willis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g\",\"caption\":\"Kristin Willis\"},\"sameAs\":[\"https:\/\/www.karlstechnology.com\"],\"url\":\"https:\/\/www.karlstechnology.com\/blog\/author\/kristin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Trojan Malware through Word - Computer Repair Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/","og_locale":"en_US","og_type":"article","og_title":"New Trojan Malware through Word - Computer Repair Blog","og_description":"New phishing emails that contain trojan malware are spreading, according to experts. The malware, named Ursnif, is contained in Word documents through emails and allow cyber hackers to steal personal credentials. Ursnif isn&#8217;t the first of its kind, however. It was reported that this particular variant has been around since 2007 and specifically targets Windows [&hellip;]","og_url":"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/","og_site_name":"Computer Repair Blog","article_publisher":"https:\/\/www.facebook.com\/karlstechnology","article_published_time":"2019-08-09T16:09:53+00:00","article_modified_time":"2019-08-09T16:09:55+00:00","og_image":[{"width":1200,"height":629,"url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/08\/My-Post-7.png","type":"image\/png"}],"author":"Kristin Willis","twitter_misc":{"Written by":"Kristin Willis","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/#article","isPartOf":{"@id":"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/"},"author":{"name":"Kristin Willis","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d"},"headline":"New Trojan Malware through Word","datePublished":"2019-08-09T16:09:53+00:00","dateModified":"2019-08-09T16:09:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/"},"wordCount":195,"commentCount":0,"publisher":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/#primaryimage"},"thumbnailUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/08\/My-Post-7.png","keywords":["hack","malware","trojan"],"articleSection":["Computer Repair"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/","url":"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/","name":"New Trojan Malware through Word - Computer Repair Blog","isPartOf":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/#primaryimage"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/#primaryimage"},"thumbnailUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/08\/My-Post-7.png","datePublished":"2019-08-09T16:09:53+00:00","dateModified":"2019-08-09T16:09:55+00:00","breadcrumb":{"@id":"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/#primaryimage","url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/08\/My-Post-7.png","contentUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/08\/My-Post-7.png","width":1200,"height":629},{"@type":"BreadcrumbList","@id":"https:\/\/www.karlstechnology.com\/blog\/new-trojan-malware-through-word\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.karlstechnology.com\/blog\/"},{"@type":"ListItem","position":2,"name":"New Trojan Malware through Word"}]},{"@type":"WebSite","@id":"https:\/\/www.karlstechnology.com\/blog\/#website","url":"https:\/\/www.karlstechnology.com\/blog\/","name":"Computer Repair Blog","description":"Karls Technology Computer Repair","publisher":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.karlstechnology.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.karlstechnology.com\/blog\/#organization","name":"Karls Technology","url":"https:\/\/www.karlstechnology.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png","contentUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png","width":800,"height":99,"caption":"Karls Technology"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/karlstechnology","https:\/\/x.com\/karlstechnology"]},{"@type":"Person","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d","name":"Kristin Willis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g","caption":"Kristin Willis"},"sameAs":["https:\/\/www.karlstechnology.com"],"url":"https:\/\/www.karlstechnology.com\/blog\/author\/kristin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/577"}],"collection":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/users\/22392"}],"replies":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/comments?post=577"}],"version-history":[{"count":1,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/577\/revisions"}],"predecessor-version":[{"id":580,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/577\/revisions\/580"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/media\/579"}],"wp:attachment":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/media?parent=577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/categories?post=577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/tags?post=577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}