How Hackers Hack Companies With Microsoft Office

  Рет қаралды 46,354

Marcus Hutchins

Marcus Hutchins

3 жыл бұрын

Demonstrating one of the most common methods hackers use to get into company networks and what to look out for. Full version coming soon.

Пікірлер: 95
@RobertWallhead
@RobertWallhead 3 жыл бұрын
This should be a mandatory new employee video for all companies
@martinrages
@martinrages 2 жыл бұрын
No, that would make my job more difficult.
@luna2.026
@luna2.026 3 жыл бұрын
I watched disrupted video on you and I’m so glad I found your channel
@georgesanderson918
@georgesanderson918 3 жыл бұрын
Yes! I love these videos so much!! Just one question, I've always been interested in reversing stuff, and I just want to know when is the next reverse engineering with IDA/Ghidra tutorial gonna be? Anyways thanks
@henchnerd9404
@henchnerd9404 3 жыл бұрын
ive been looking for a video showcasing this for so long! from a cs student always hungry to learn thank you so much Marcus!
@eros4510
@eros4510 2 жыл бұрын
Great video, new to InfoSec but I love videos that show how easy it is to get user privilege on a box, really scares everyone else lol
@henchnerd9404
@henchnerd9404 3 жыл бұрын
This is one of APT28's favorite methods of delivery so happy to see an example finaly! (second comment for the algorithim)
@tehpr0lol
@tehpr0lol 3 жыл бұрын
any practical advice for companies who genuinely use macros as part of their Office docs and apps - or are we just saying don't click "enable content"?
@boogaplays123
@boogaplays123 2 күн бұрын
Didnt know you made this video i watched it like 50 times
@hitorinohitorino
@hitorinohitorino Жыл бұрын
For companies, this option would only have to be able to run VBA with their own company signature, so outside of Office or Excel files can only be run with a valid signature from their company. That's how it is with us, if I would write a VBA, the admin has to sign it to be able to run the script
@cyberc0l0mbiana
@cyberc0l0mbiana 3 жыл бұрын
LOVED it! 🔥 Can’t wait for more!
@internetwarrior666
@internetwarrior666 3 жыл бұрын
Marcus' cock or the video? Come on you can't be serious this video was basically a role-playing of how every skid these days is infecting each other, it's hardly apt and/or just ransomware groups.. anybody who can access any of the Russian forums and has $100 can get a UD exploit like that for their malware. The method of delivery is not even new and if you were to check the date on the CVE you would notice that Microsoft among others haven't done a very good job dealijg with these exploits considering that some of them still being used date back to 2017.
@astonmuk7118
@astonmuk7118 3 жыл бұрын
Marcus the geek,, this is great.!
@dalvizar4040
@dalvizar4040 2 күн бұрын
can i ask a permission to make this video a mandatory and security awarness video for my company? i will include the original owner and crator of course, i really love all your videos it's so helping for me!
@000maestro000
@000maestro000 3 жыл бұрын
I love companies who give you gaming laptops as work laptop :) seriously though, nice presentation
@kevinalexander4959
@kevinalexander4959 3 жыл бұрын
yeah it's retarded. All that power and juice and size for running an Excel worksheet. Waste of money. Get an ultrabook instead! Gaming laptops are made to game, not try and show off your big lit up PC at work.
@000maestro000
@000maestro000 3 жыл бұрын
@@kevinalexander4959 its probably not a real work laptop though, this id just a demo...
@tiromandal6399
@tiromandal6399 3 жыл бұрын
@@kevinalexander4959 So smart of you to assume they use nothing but Excel on their gaming laptops! Damn you're one helluva genius dude! You're welcome btw....
@spacifiasome2229
@spacifiasome2229 3 жыл бұрын
Get reverse shell possible.. but how did you open desktop on kali
@VideosNotFound
@VideosNotFound Жыл бұрын
I never knew it was THIS easy ...
@Debarros2010
@Debarros2010 Жыл бұрын
Any step by step how to set up this both on Win PC (The script) and on K.ali Linux PC? Thanks
@Hamidtbeigi
@Hamidtbeigi 3 жыл бұрын
Perfect 👍
@LabEveryday
@LabEveryday 2 жыл бұрын
Good video!
@alexsec6418
@alexsec6418 Жыл бұрын
When are you coming to teach us the full skills as a tutorials boss
@blameItleaveit
@blameItleaveit 3 жыл бұрын
Simple and sweet
@no_winger
@no_winger 3 жыл бұрын
Information ❤️ Marcus
@didyouknowamazingfacts2790
@didyouknowamazingfacts2790 2 жыл бұрын
I don't understand how the antivirus doesn't pick up on the malware.
@neloangelo__13
@neloangelo__13 3 жыл бұрын
Hey Marcus, where did you get your FancyBear T-shirt?
@MalwareTechBlog
@MalwareTechBlog 3 жыл бұрын
It was a gift from a CrowdStrike executive
@mayurahir9340
@mayurahir9340 3 жыл бұрын
Can u make video on how to setup tor to completely anonymous on internet
@novianindy887
@novianindy887 7 ай бұрын
you should show what's in the VBA code. Is it not detected by AV?
@pabloturnesg
@pabloturnesg 3 жыл бұрын
Why did you do it in windows 8, is it possible in win 10 updated?
@MalwareTechBlog
@MalwareTechBlog 3 жыл бұрын
Yeah it's possible in Windows 10, I just didn't have an activated copy of MS Office in my W10 VM.
@hack-talk9098
@hack-talk9098 Жыл бұрын
@@MalwareTechBlog please for educational purpose please give us the code. A lot of white whites like us are looking up to you. Daniel from Ghana
@dalvizarkafilhamristijana1130
@dalvizarkafilhamristijana1130 2 жыл бұрын
This is a really usefull information sir, thanks for the informations. I'm a IT Security Officer in my company, and already experienced one case regarding to this Technique, so what mus we do if we need to edit the Documents because it's important? Because the antivirus in my companies not detect the suspicious background activity whenever user click "Enable Protected View". Do i must check it with reverse engineering or just checking in virustotal to avoid Security Issues? Thanks
@hitorinohitorino
@hitorinohitorino Жыл бұрын
I recommend that you only be able to run the VBA options using company signatures. A VBA script can only be executed with a valid company signature. a must for companies only with their signatur can run VBA, its e recommen option.
@TecraTube
@TecraTube 3 жыл бұрын
Aren't you famous or infamous or something?
@patapon3051
@patapon3051 3 жыл бұрын
Great tutorial worked on FBI thanks!
@bdas8420
@bdas8420 3 жыл бұрын
Bruh
@berthold9582
@berthold9582 2 жыл бұрын
I am new to your youtube chanel
@skeletron9505
@skeletron9505 Жыл бұрын
El barto was here
@user-px4qd4ip8k
@user-px4qd4ip8k 2 жыл бұрын
I love this field, but unfortunately I can't understand English. My greetings to you Abdo to Mr. Marcus.
@muudus_tv
@muudus_tv 3 жыл бұрын
I think I reverse engineered Ghidra.
@Based-Indian
@Based-Indian 3 жыл бұрын
Which tool did You use?
@internetwarrior666
@internetwarrior666 3 жыл бұрын
Looks like msf with a pdf/xls macro and brain.
@damnson2806
@damnson2806 2 жыл бұрын
What's the ASUS model?
@camillavergas7822
@camillavergas7822 2 жыл бұрын
do you wish to learn more or get the best software ???
@damnson2806
@damnson2806 2 жыл бұрын
@@camillavergas7822 I wish to know the ASUS model.
@arthurrotarmel754
@arthurrotarmel754 Жыл бұрын
now i get my revenge
@anujtripathi4653
@anujtripathi4653 3 жыл бұрын
First view ⚡⚡⚡❤
@rlynotabot
@rlynotabot 2 жыл бұрын
We've been trying to reach you about your car's extended warranty
@nikos4677
@nikos4677 2 жыл бұрын
*for educational purposes only*
@minibit0103
@minibit0103 3 жыл бұрын
Wouldn’t defender pick this up right away?
@syskey1402
@syskey1402 2 жыл бұрын
It depends if it is obfuscated or not etc... Also how widely used the code is
@ivasivancic2355
@ivasivancic2355 Жыл бұрын
@@syskey1402 HEy man , i would you ask some question,do you have email or whatsup or something like that ,im just student and cyber sec resreacher :) PM me :)
@yacoubakonte3146
@yacoubakonte3146 3 жыл бұрын
Salut Marcus comment as tu acquéri les connaissances en informatique étant si jeune
@peterkim9696
@peterkim9696 3 жыл бұрын
Probablement il ne comprend pas le français hh
@farisikhmal4868
@farisikhmal4868 3 жыл бұрын
nice
@hjk9166
@hjk9166 3 жыл бұрын
this is html
@mose3c96
@mose3c96 3 жыл бұрын
I see some open malware without click enable button
@Gamer-xk8bk
@Gamer-xk8bk Жыл бұрын
This is because malvare threat actors use different ways to comprise a system. This is just one of the ways and that is using macros as a way of dropping malvare into the system.
@mose3c96
@mose3c96 Жыл бұрын
@@Gamer-xk8bk thanks for your replay
@sayemon10
@sayemon10 3 жыл бұрын
holy crap
@felixayenor9090
@felixayenor9090 3 жыл бұрын
My lovely hacker!
@peterkim9696
@peterkim9696 3 жыл бұрын
What about anti-virus?
@harrieswanepoel9678
@harrieswanepoel9678 3 жыл бұрын
Yeah well it’s apparently impossible to create a fud macro -> always gets detected
@root317
@root317 3 жыл бұрын
wrong
@internetwarrior666
@internetwarrior666 3 жыл бұрын
@@root317 scantime it'll be FUD runtime, no.
@root317
@root317 3 жыл бұрын
@@internetwarrior666 ther is always a way. Trust me i've seen some. They obfuscate the macro. Bypass amsi and load the payload. Without getting detected.
@internetwarrior666
@internetwarrior666 3 жыл бұрын
@@root317 obfuscation only helps with scan time, the rest yeah but you would need to know how to write a custom shellcode injection and most services that offer the macro don't offer that to just anyone.
@root317
@root317 3 жыл бұрын
i know. it helps for static analysis. as for execution there is a lot you can do... the most basic way with powershell...
@JustTheHighlights
@JustTheHighlights 7 ай бұрын
🤯
@1science2code22
@1science2code22 3 жыл бұрын
What's your TikTok?
@MalwareTechBlog
@MalwareTechBlog 3 жыл бұрын
MalwareTech
@TecraTube
@TecraTube 3 жыл бұрын
Bruh, Microsoft document macros are so 90's, yet they're so perfect for today! People are morons. Then, now, and will always be 😉
@flTobi
@flTobi 3 жыл бұрын
I'd rather blame Microsoft for not fixing the underlying instead of putting the blame on other people. Not everyone is tech-savvy or part of the infosec community....
@TecraTube
@TecraTube 3 жыл бұрын
@@flTobi yaa, nooo... If you were in infosec, you'd know the biggest, most prevalent security flaw in ANY system, is the human
@flTobi
@flTobi 3 жыл бұрын
@@TecraTube yeah and that's exactly why obvious design flaws like this should be avoided, instead of insulting the users who fall victim to these kind of scams
@superman1251
@superman1251 3 жыл бұрын
Jesus
@justforyoutube1319
@justforyoutube1319 3 жыл бұрын
Second
@kan8816
@kan8816 3 жыл бұрын
Where you I am Anonymous
@dangerouscoder3455
@dangerouscoder3455 3 жыл бұрын
Exploit name
@internetwarrior666
@internetwarrior666 3 жыл бұрын
Just go to exploit and buy it 😂
@yeetyeet7070
@yeetyeet7070 3 жыл бұрын
why is the comment section tiktokers instead of nerds now? :( don't but bad words in your title, the algorithm will ruin your channel
@reverseturingtest
@reverseturingtest 3 жыл бұрын
If you don't mind me asking, what's wrong with educating the general public about malware and computer safety?
@milkiastewelde5089
@milkiastewelde5089 2 жыл бұрын
Can you send me the code you us to hack the computer please 🙏
@ryanconorantonio732
@ryanconorantonio732 2 жыл бұрын
i am really confused dont you have a group"?facebook ,telegram?
@awaaragaming6320
@awaaragaming6320 2 жыл бұрын
This computer hacking curlneltely we did your meeting for herriot and you can hack just gogle but with your passwords wo can somthing Don live rise because he can be compared to data
@DanRellex
@DanRellex 2 жыл бұрын
We've been trying to reach you about your car's extended warranty
3 Levels of WiFi Hacking
22:12
NetworkChuck
Рет қаралды 1,7 МЛН
My Recommendations For Buying A Computer
9:26
Marcus Hutchins
Рет қаралды 44 М.
Does size matter? BEACH EDITION
00:32
Mini Katana
Рет қаралды 20 МЛН
路飞被小孩吓到了#海贼王#路飞
00:41
路飞与唐舞桐
Рет қаралды 82 МЛН
How hackers are breaking into MFA enabled Microsoft 365 accounts
6:00
Hacking Websites Built With ChatGPT
14:29
Marcus Hutchins
Рет қаралды 20 М.
how hackers hack any website in 8 minutes 6 seconds?!
8:06
Loi Liang Yang
Рет қаралды 69 М.
CrowdStrike IT Outage Explained by a Windows Developer
13:40
Dave's Garage
Рет қаралды 2 МЛН
How to know if your PC is hacked? Suspicious Network Activity 101
10:19
The PC Security Channel
Рет қаралды 1,2 МЛН
Watch this hacker break into a company
2:56
CNN Business
Рет қаралды 3,9 МЛН
Find Vulnerable Services & Hidden Info Using Google Dorks [Tutorial]
13:37
How Hackers Hack CCTV Cameras
15:00
zSecurity
Рет қаралды 761 М.
Dangerous Hacking Gadgets in 2024 #hacker #tools
11:20
Hacker Joe
Рет қаралды 493 М.
Я купил первый в своей жизни VR! 🤯
1:00
Вэйми
Рет қаралды 2 МЛН
Look, this is the 97th generation of the phone?
0:13
Edcers
Рет қаралды 6 МЛН
Telefonu Parçaladım!😱
0:16
Safak Novruz
Рет қаралды 25 МЛН