My article is about how can an undocumented Microsoft Office feature allows attackers to gather sensitive configuration details on targeted systems simply by tricking recipients to open a specially crafted word documents. In the article, it also mentions that researches have observed several spear phishing campaigns containing the malicious attachments that are laying the groundwork for future attacks using Microsoft products.
Attackers Use Undocumented MS Office Feature to Leak System Profile Data
Ronghui Zhan says
very interesting. you lead me to a bigger world. thank you.