{"id":3748,"date":"2021-09-14T21:02:55","date_gmt":"2021-09-15T02:02:55","guid":{"rendered":"https:\/\/truxgoservers.com\/blog\/?p=3748"},"modified":"2021-09-14T21:02:56","modified_gmt":"2021-09-15T02:02:56","slug":"why-office-packages-can-be-so-dangerous","status":"publish","type":"post","link":"https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/","title":{"rendered":"Why Office Packages can be so Dangerous?"},"content":{"rendered":"\n<p>One of the many strategies used by cybercriminals to try to infect their victims&#8217; computers is by sending a document from the Office suite (text documents, spreadsheets, presentations, among others) with malicious content. The document can be attached in an email or in some cases compressed within another file, for example a ZIP file. These documents used as a decoy usually refer to different topics (invoices, receipts, etc.) with the aim of making people believe that it is a legitimate file and thus trick the user into executing it.<\/p>\n\n\n\n<p>Something very important to keep in mind about these threats are the extensions with which the Office files end, and we will see which are the most used by these threats.<\/p>\n\n\n\n<p><strong><em>\u25b8Macros<\/em><\/strong><\/p>\n\n\n\n<p>A macro is a series of instructions grouped under the same command that allows a task to be executed automatically in a document. In this way, cybercriminals develop macros (usually using the Visual Basic programming language) to put them inside documents for malicious purposes.<\/p>\n\n\n\n<p><strong><em>\u25b8OLE or Object Linking and Embedding<\/em><\/strong><\/p>\n\n\n\n<p>OLE is a technology developed by Microsoft that allows you to take an Object from one document and place it in another; for example, include a table from an Excel spreadsheet in a Word document. Inclusion can be done by linking against another application, thus allowing the data to not be in the original file. Another option may be that they are embedded (embedding) making them part of the same document and detaching them from their source file. Criminals can use these OLE objects to include malicious code developed, for example, in Visual Basic or JavaScript, to be executed when the user interacts with them.<\/p>\n\n\n\n<p><strong><em>\u25b8Files with an extension ending with X<\/em><\/strong><\/p>\n\n\n\n<p>We can open these files with some compression \/ decompression tool. Once unzipped, we will observe the existence of many files. For example, the [Content_Types] .xml file that contains information for the entire document; or files that end with the extension \u201crels\u201d (for example \u201cdocument.xml.rels\u201d) that are used to establish relationships between different sections of the document &#8211; styles, footer or URL with external links.<\/p>\n\n\n\n<p>The best thing we can do to avoid these Office threats is to search for the file in tools that offer the possibility of analyzing files on different security solutions, as well as searching a file by hash or searching from a URL, before opening Some of these documents must have macro protection enabled, etc.<\/p>\n\n\n\n<p>It is important to remember that cybercriminals are constantly creating new evasion or obfuscation techniques, so it is possible that some of these techniques (or all) cannot be applied in a particular case and that is why it is important to stay informed and alert.<\/p>\n\n\n\n<p>Other reads:<br><a href=\"https:\/\/truxgoservers.com\/blog\/macro-malware-a-threat-designed-to-fool-the-victims\/\">Macro Malware threats designed to fool the victims<\/a><br><a href=\"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/\">VBA Stomping malicious spawn technique<\/a><br><a href=\"https:\/\/truxgoservers.com\/blog\/threats-you-face-every-day-within-e-mail\/\">Threats you face every day within E-mail<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the many strategies used by cybercriminals to try to infect their victims&#8217; computers is by sending a document from the Office suite (text documents, spreadsheets, presentations, among others) with malicious content. The document can be attached in an email or in some cases compressed within another file, for example a ZIP file. These [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3749,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[36],"class_list":["post-3748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why Office Packages can be so Dangerous? - Truxgo Server Blog<\/title>\n<meta name=\"description\" content=\"Today we will see one of the techniques most used by cybercriminals which consists of infecting computers by sending an Office package.....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Office Packages can be so Dangerous? - Truxgo Server Blog\" \/>\n<meta property=\"og:description\" content=\"Today we will see one of the techniques most used by cybercriminals which consists of infecting computers by sending an Office package.....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/\" \/>\n<meta property=\"og:site_name\" content=\"Truxgo Server Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-15T02:02:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-15T02:02:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/09\/Office.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"696\" \/>\n\t<meta property=\"og:image:height\" content=\"522\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Truxgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Truxgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/why-office-packages-can-be-so-dangerous\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/why-office-packages-can-be-so-dangerous\\\/\"},\"author\":{\"name\":\"Truxgo\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\"},\"headline\":\"Why Office Packages can be so Dangerous?\",\"datePublished\":\"2021-09-15T02:02:55+00:00\",\"dateModified\":\"2021-09-15T02:02:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/why-office-packages-can-be-so-dangerous\\\/\"},\"wordCount\":479,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/why-office-packages-can-be-so-dangerous\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Office.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/why-office-packages-can-be-so-dangerous\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/why-office-packages-can-be-so-dangerous\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/why-office-packages-can-be-so-dangerous\\\/\",\"name\":\"Why Office Packages can be so Dangerous? - Truxgo Server Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/why-office-packages-can-be-so-dangerous\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/why-office-packages-can-be-so-dangerous\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Office.jpg\",\"datePublished\":\"2021-09-15T02:02:55+00:00\",\"dateModified\":\"2021-09-15T02:02:56+00:00\",\"description\":\"Today we will see one of the techniques most used by cybercriminals which consists of infecting computers by sending an Office package.....\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/why-office-packages-can-be-so-dangerous\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/why-office-packages-can-be-so-dangerous\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/why-office-packages-can-be-so-dangerous\\\/#primaryimage\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Office.jpg\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Office.jpg\",\"width\":696,\"height\":522},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/why-office-packages-can-be-so-dangerous\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Office Packages can be so Dangerous?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"name\":\"Truxgo Server Blog\",\"description\":\"Cloud Server and Hosting Tutorials.\",\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\",\"name\":\"Truxgo Server Blog\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"width\":1250,\"height\":278,\"caption\":\"Truxgo Server Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\",\"name\":\"Truxgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"caption\":\"Truxgo\"},\"sameAs\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\"],\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/author\\\/truxgo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Office Packages can be so Dangerous? - Truxgo Server Blog","description":"Today we will see one of the techniques most used by cybercriminals which consists of infecting computers by sending an Office package.....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/","og_locale":"es_MX","og_type":"article","og_title":"Why Office Packages can be so Dangerous? - Truxgo Server Blog","og_description":"Today we will see one of the techniques most used by cybercriminals which consists of infecting computers by sending an Office package.....","og_url":"https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/","og_site_name":"Truxgo Server Blog","article_published_time":"2021-09-15T02:02:55+00:00","article_modified_time":"2021-09-15T02:02:56+00:00","og_image":[{"width":696,"height":522,"url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/09\/Office.jpg","type":"image\/jpeg"}],"author":"Truxgo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Truxgo","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/#article","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/"},"author":{"name":"Truxgo","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e"},"headline":"Why Office Packages can be so Dangerous?","datePublished":"2021-09-15T02:02:55+00:00","dateModified":"2021-09-15T02:02:56+00:00","mainEntityOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/"},"wordCount":479,"commentCount":0,"publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/09\/Office.jpg","keywords":["Cybersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/","url":"https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/","name":"Why Office Packages can be so Dangerous? - Truxgo Server Blog","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/#primaryimage"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/09\/Office.jpg","datePublished":"2021-09-15T02:02:55+00:00","dateModified":"2021-09-15T02:02:56+00:00","description":"Today we will see one of the techniques most used by cybercriminals which consists of infecting computers by sending an Office package.....","breadcrumb":{"@id":"https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/#primaryimage","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/09\/Office.jpg","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/09\/Office.jpg","width":696,"height":522},{"@type":"BreadcrumbList","@id":"https:\/\/truxgoservers.com\/blog\/why-office-packages-can-be-so-dangerous\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/truxgoservers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Office Packages can be so Dangerous?"}]},{"@type":"WebSite","@id":"https:\/\/truxgoservers.com\/blog\/#website","url":"https:\/\/truxgoservers.com\/blog\/","name":"Truxgo Server Blog","description":"Cloud Server and Hosting Tutorials.","publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/truxgoservers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/truxgoservers.com\/blog\/#organization","name":"Truxgo Server Blog","url":"https:\/\/truxgoservers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","width":1250,"height":278,"caption":"Truxgo Server Blog"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e","name":"Truxgo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","caption":"Truxgo"},"sameAs":["https:\/\/truxgoservers.com\/blog"],"url":"https:\/\/truxgoservers.com\/blog\/author\/truxgo\/"}]}},"_links":{"self":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/3748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/comments?post=3748"}],"version-history":[{"count":2,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/3748\/revisions"}],"predecessor-version":[{"id":3760,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/3748\/revisions\/3760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media\/3749"}],"wp:attachment":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media?parent=3748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/categories?post=3748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/tags?post=3748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}