Safebreach Labs has updated the Hacker's Playbook™ with simulations for Microsoft PowerPoint slideshows which contain malicious mouse-over hyperlinks. Customers can use these simulations to safely test their security controls against the specific tactics and techniques used in campaigns that leverage malicious mouse-over links within PowerPoint files.
The breach simulates an infiltration method which uses a Microsoft PowerPoint slideshow containing a malicious mouse-over hyperlink. When the user needs hovers their mouse over the hyperlink, a PowerShell script is initiated, which attempts to download and execute malware.
To assess security control effectiveness against this new mouse-over infection method, the SafeBreach Continuous Security Validation Platform specifically tests the following endpoint and network security controls:
Playbook #1323 - Malicious PowerPoint with mouse-over downloader
Additional breach methods added recently include:
The Safebreach Hacker's Playbook™ of breach methods simulates these breach scenarios, and thousands more, without impacting users or infrastructure. Breach methods are constantly updated by SafeBreach Labs, our team of offensive security researchers, to help keep customers ahead of attacks.
March 22, 2019
March 18, 2019