2023
DOI: 10.1145/3513025
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents

Abstract: Many malware campaigns use Microsoft (MS) Office documents as droppers to download and execute their malicious payload. Such campaigns often use these documents because MS Office is installed on billions of devices and that these files allow the execution of arbitrary VBA code. Recent versions of MS Office prevent the automatic execution of VBA macros, so malware authors try to convince users into enabling the content via images that, e.g. forge system or technical errors. In this article, we propose… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…In 2022, Fran Casino et al embarked on pioneering research that leveraged the visual aspects of cyber attacks for the identification of malicious Microsoft Office documents [29]. Their approach harnessed the power of perceptual hashing and Optical Character Recognition (OCR) to detect and analyze embedded images designed to coerce victims into enabling macros or taking other malicious actions.…”
Section: ) Machine Learning Based Approachesmentioning
confidence: 99%
“…In 2022, Fran Casino et al embarked on pioneering research that leveraged the visual aspects of cyber attacks for the identification of malicious Microsoft Office documents [29]. Their approach harnessed the power of perceptual hashing and Optical Character Recognition (OCR) to detect and analyze embedded images designed to coerce victims into enabling macros or taking other malicious actions.…”
Section: ) Machine Learning Based Approachesmentioning
confidence: 99%
“…The aforesaid improvements have facilitated the exceptional performance of machine learning algorithms in this particular field (Mishra A, 2020 ;Reddy DK, 2023). The NLP techniques have been crucial in enabling the detection of harmful intent in textual data, as demonstrated by their successful implementation in the identification of phishing efforts (Casino F, 2023). Scam detection using text has been greatly improved by NLP techniques successfully (Kumar S, 2023).…”
Section: Introductionmentioning
confidence: 99%