Phishing Emails Used to Deploy KONNI Malware
if you are in the habit of using micro$not software, particularly the office varients (word, excell, power point, etc.), you should beware of the new “phishing” (specifically, “spear-phishing”) attack which uses an infected microsoft word document as the vector.
solution: don’t use micro$hit.
alternative solution: don’t use windoesn’t, or, if you do, don’t open ANY files that you receive in email, from ANYONE, if you weren’t expecting it, keep your antivirus software up to date, backup everything, and pray that something doesn’t happen anyway.
this is just the most recent extension of the exploder control controversy, started by my friend fred, back when W95 was current… except that, now, instead of calling it “OLE or “ActiveX” they’re calling it “VBA“, and it can do a lot more nefarious things to your computer than the exploder control could do — and the exploder control was relatively benign, in that it ONLY shut down your computer without your say so…
but micro$lop made a BIG OL’ fuss about it, when fred actually got it signed, because of the fact that it used ActiveX APIs in EXACTLY the way they were supposed to be used, and the automated process of signing didn’t take into account what the control actually DID, and whether doing that thing, at that time, was actually USEFUL… 😂🤣
by the way, the exploder control was SPECIFICALLY designed to work with W95 and IE3, so, unless you’re browsing on your grandfather’s computer, you’ve got nothing to worry about. 😉