How Can Hackers Attack Your Computer Through a Weakness in Microsoft Office?

To exploit the flaw, a hacker creates a Microsoft Office file with a malicious OLE object. OLE stands for “Object Linking and Embedding” and it lets you bring spreadsheets from Excel or text from Word into another document, like a PowerPoint presentation.

In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.

If you open an Office file with a malicious OLE, a hacker can take over your system.


Get complete web safety :


How to Stay Protected form Hackers?

When you open the malicious Office file in Windows Vista or newer, Windows’ user account controls will ask you for permission to install or run a program. That’s a warning sign that something isn’t right with the file.

an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. You need to stay safe at that time.

Even if the OLE hack works, the hacker will only have as much control over your computer as you do. So, if you use an Administrator user account, the hacker can do anything they want.


Stay Protected & Surf web safely with Best Antivirus Solution : webroot install


Leave a Reply

Your email address will not be published. Required fields are marked *