{"id":2417,"date":"2021-04-10T15:45:43","date_gmt":"2021-04-10T20:45:43","guid":{"rendered":"https:\/\/truxgoservers.com\/blog\/?p=2417"},"modified":"2021-04-10T15:45:44","modified_gmt":"2021-04-10T20:45:44","slug":"ettersilent-tool-used-by-cybercriminals","status":"publish","type":"post","link":"https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/","title":{"rendered":"EtterSilent tool used by cybercriminals"},"content":{"rendered":"\n<p>A malicious document generator called EtterSilent is gaining more attention on underground forums, security researchers note. As its popularity grew, the developer continued to improve it to avoid detection by security solutions, this tool gives attackers the ability to generate malicious Microsoft Term documents capable of compromising systems with hard-to-detect attacks, underscoring the danger. continuous represented by macros.<\/p>\n\n\n\n<p>EtterSilent, has quickly become well-known among cybercrime groups and allows attackers to create Phrase files that masquerade as DocuSign documents but can actually compromise systems using macros or exploiting a known vulnerability. Windows systems that are configured to allow macros to run, or that have not been patched for the specific vulnerability, are at risk from files created by the service.<\/p>\n\n\n\n<p>Macros have plagued cybersecurity for decades. In 1999, the first widespread email infecter, the Melissa virus, used a Term document with a macro to infect systems and send itself to other people in the victim&#8217;s address book. Last year, researchers discovered that cybercriminals were increasingly using Excel 4 macros as a way to execute attack scripts. Macros in the Microsoft Office environment can also affect the security of Macs, if the attacker breaks through some layers of security.<\/p>\n\n\n\n<p>One of the exploited vulnerabilities is CVE-2017-8570, a high severity remote code execution. The author also mentioned two other vulnerabilities CVE-2017-11882 is CVE-2018-0802, although some restrictions have been applied, and in fact they have been demonstrated on video.<\/p>\n\n\n\n<p>EtterSilents services is pretty cheap, security experts say, and it costs only a few dollars to build. So far, only EtterSilent documents sent as spam as part of a Trickbot campaign have been seen, as well as three banking Trojans: BokBot, Gozi ISFB and QBot, and as we always say, do not fall for these deception attempts, before opening any Mail analyze it, read it and if you don&#8217;t trust it, delete it is the best.<\/p>\n\n\n\n<p>See also:<br><a href=\"https:\/\/truxgoservers.com\/blog\/cybercriminals-create-application-pass-telegram\/\">Cybercriminals create an app that passes as Telegram<\/a><br><a href=\"https:\/\/truxgoservers.com\/blog\/pos-malware-is-a-virus-that-steals-financial-data\/\">PoS Malware is a Virus that steals financial data<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A malicious document generator called EtterSilent is gaining more attention on underground forums, security researchers note. As its popularity grew, the developer continued to improve it to avoid detection by security solutions, this tool gives attackers the ability to generate malicious Microsoft Term documents capable of compromising systems with hard-to-detect attacks, underscoring the danger. continuous [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2418,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[36],"class_list":["post-2417","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EtterSilent tool used by cybercriminals - Truxgo Server Blog<\/title>\n<meta name=\"description\" content=\"EtterSilent is a tool that has been becoming popular among cybercriminals and we will see why and what dangers this tool presents....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EtterSilent tool used by cybercriminals - Truxgo Server Blog\" \/>\n<meta property=\"og:description\" content=\"EtterSilent is a tool that has been becoming popular among cybercriminals and we will see why and what dangers this tool presents....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/\" \/>\n<meta property=\"og:site_name\" content=\"Truxgo Server Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-10T20:45:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-10T20:45:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/04\/new.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Truxgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Truxgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/ettersilent-tool-used-by-cybercriminals\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/ettersilent-tool-used-by-cybercriminals\\\/\"},\"author\":{\"name\":\"Truxgo\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\"},\"headline\":\"EtterSilent tool used by cybercriminals\",\"datePublished\":\"2021-04-10T20:45:43+00:00\",\"dateModified\":\"2021-04-10T20:45:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/ettersilent-tool-used-by-cybercriminals\\\/\"},\"wordCount\":338,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/ettersilent-tool-used-by-cybercriminals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/new.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/ettersilent-tool-used-by-cybercriminals\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/ettersilent-tool-used-by-cybercriminals\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/ettersilent-tool-used-by-cybercriminals\\\/\",\"name\":\"EtterSilent tool used by cybercriminals - Truxgo Server Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/ettersilent-tool-used-by-cybercriminals\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/ettersilent-tool-used-by-cybercriminals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/new.jpg\",\"datePublished\":\"2021-04-10T20:45:43+00:00\",\"dateModified\":\"2021-04-10T20:45:44+00:00\",\"description\":\"EtterSilent is a tool that has been becoming popular among cybercriminals and we will see why and what dangers this tool presents....\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/ettersilent-tool-used-by-cybercriminals\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/ettersilent-tool-used-by-cybercriminals\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/ettersilent-tool-used-by-cybercriminals\\\/#primaryimage\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/new.jpg\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/new.jpg\",\"width\":900,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/ettersilent-tool-used-by-cybercriminals\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EtterSilent tool used by cybercriminals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"name\":\"Truxgo Server Blog\",\"description\":\"Cloud Server and Hosting Tutorials.\",\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\",\"name\":\"Truxgo Server Blog\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"width\":1250,\"height\":278,\"caption\":\"Truxgo Server Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\",\"name\":\"Truxgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"caption\":\"Truxgo\"},\"sameAs\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\"],\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/author\\\/truxgo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EtterSilent tool used by cybercriminals - Truxgo Server Blog","description":"EtterSilent is a tool that has been becoming popular among cybercriminals and we will see why and what dangers this tool presents....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/","og_locale":"es_MX","og_type":"article","og_title":"EtterSilent tool used by cybercriminals - Truxgo Server Blog","og_description":"EtterSilent is a tool that has been becoming popular among cybercriminals and we will see why and what dangers this tool presents....","og_url":"https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/","og_site_name":"Truxgo Server Blog","article_published_time":"2021-04-10T20:45:43+00:00","article_modified_time":"2021-04-10T20:45:44+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/04\/new.jpg","type":"image\/jpeg"}],"author":"Truxgo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Truxgo","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/#article","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/"},"author":{"name":"Truxgo","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e"},"headline":"EtterSilent tool used by cybercriminals","datePublished":"2021-04-10T20:45:43+00:00","dateModified":"2021-04-10T20:45:44+00:00","mainEntityOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/"},"wordCount":338,"commentCount":1,"publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/04\/new.jpg","keywords":["Cybersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/","url":"https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/","name":"EtterSilent tool used by cybercriminals - Truxgo Server Blog","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/#primaryimage"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/04\/new.jpg","datePublished":"2021-04-10T20:45:43+00:00","dateModified":"2021-04-10T20:45:44+00:00","description":"EtterSilent is a tool that has been becoming popular among cybercriminals and we will see why and what dangers this tool presents....","breadcrumb":{"@id":"https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/#primaryimage","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/04\/new.jpg","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/04\/new.jpg","width":900,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/truxgoservers.com\/blog\/ettersilent-tool-used-by-cybercriminals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/truxgoservers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"EtterSilent tool used by cybercriminals"}]},{"@type":"WebSite","@id":"https:\/\/truxgoservers.com\/blog\/#website","url":"https:\/\/truxgoservers.com\/blog\/","name":"Truxgo Server Blog","description":"Cloud Server and Hosting Tutorials.","publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/truxgoservers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/truxgoservers.com\/blog\/#organization","name":"Truxgo Server Blog","url":"https:\/\/truxgoservers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","width":1250,"height":278,"caption":"Truxgo Server Blog"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e","name":"Truxgo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","caption":"Truxgo"},"sameAs":["https:\/\/truxgoservers.com\/blog"],"url":"https:\/\/truxgoservers.com\/blog\/author\/truxgo\/"}]}},"_links":{"self":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/2417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/comments?post=2417"}],"version-history":[{"count":2,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/2417\/revisions"}],"predecessor-version":[{"id":2435,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/2417\/revisions\/2435"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media\/2418"}],"wp:attachment":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media?parent=2417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/categories?post=2417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/tags?post=2417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}