* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [未分類](https://www2.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr) * 威脅簡報:我們經常使用的 Office 文件可能很... # 威脅簡報:我們經常使用的 Office 文件可能很危險 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F10%2Funit42-threat-brief-office-documents-can-dangerous-well-continue-use-anyway%2F%3Flang%3Dzh-hant) [](https://twitter.com/share?text=%E5%A8%81%E8%84%85%E7%B0%A1%E5%A0%B1%EF%BC%9A%E6%88%91%E5%80%91%E7%B6%93%E5%B8%B8%E4%BD%BF%E7%94%A8%E7%9A%84+Office+%E6%96%87%E4%BB%B6%E5%8F%AF%E8%83%BD%E5%BE%88%E5%8D%B1%E9%9A%AA&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F10%2Funit42-threat-brief-office-documents-can-dangerous-well-continue-use-anyway%2F%3Flang%3Dzh-hant) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2018%2F10%2Funit42-threat-brief-office-documents-can-dangerous-well-continue-use-anyway%2F%3Flang%3Dzh-hant&title=%E5%A8%81%E8%84%85%E7%B0%A1%E5%A0%B1%EF%BC%9A%E6%88%91%E5%80%91%E7%B6%93%E5%B8%B8%E4%BD%BF%E7%94%A8%E7%9A%84+Office+%E6%96%87%E4%BB%B6%E5%8F%AF%E8%83%BD%E5%BE%88%E5%8D%B1%E9%9A%AA&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2018/10/unit42-threat-brief-office-documents-can-dangerous-well-continue-use-anyway/?lang=zh-hant&ts=markdown) \[\](mailto:?subject=威脅簡報:我們經常使用的 Office 文件可能很危險) Link copied By [Liat Hayun](https://www.paloaltonetworks.com/blog/author/liat-hayun/?lang=zh-hant&ts=markdown "Posts by Liat Hayun") Oct 18, 2018 1 minutes [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) This post is also available in: [English (英語)](https://www2.paloaltonetworks.com/blog/2018/07/unit42-threat-brief-office-documents-can-dangerous-well-continue-use-anyway/ "Switch to 英語(English)") [Nederlands (荷蘭語)](https://www2.paloaltonetworks.com/blog/2018/10/bedreigingsoverzicht-office-documenten-kunnen-gevaarlijk-zijn-maar-blijven-ze-toch-gebruiken/?lang=nl "Switch to 荷蘭語(Nederlands)") [Deutsch (德語)](https://www2.paloaltonetworks.com/blog/2018/11/bedrohungsbeschreibung-office-dateien-koennen-gefaehrlich-sein-doch-wir-nutzen-sie-trotzdem/?lang=de "Switch to 德語(Deutsch)") [Italiano (義大利語)](https://www2.paloaltonetworks.com/blog/2018/11/report-sulle-minacce-documenti-di-office-possono-essere-pericolosi-ma-continueremo-usarli/?lang=it "Switch to 義大利語(Italiano)") [한국어 (韓語)](https://www2.paloaltonetworks.com/blog/2018/10/unit42-threat-brief-office-documents-can-dangerous-well-continue-use-anyway/?lang=ko "Switch to 韓語(한국어)") [Español (西班牙語)](https://www2.paloaltonetworks.com/blog/2018/11/informe-sobre-amenazas-los-documentos-de-office-pueden-ser-peligrosos-pero-seguiremos-usandolos/?lang=es "Switch to 西班牙語(Español)") [Türkçe (土耳其語)](https://www2.paloaltonetworks.com/blog/2018/11/tehdit-ozeti-office-belgeleri-tehlikeli-olabilir-ancak-yine-de-onlari-kullanmaya-devam-ederiz/?lang=tr "Switch to 土耳其語(Türkçe)") 幾乎所有人都會使用 Microsoft Office 文件。無論是工作文件、電子收據,還是新公寓的租約,Office 文件對於我們所有人而言都相當實用,也因此,我們很可能開啟收到的電子郵件中附加的 Office 文件。由於攻擊者知道許多人幾乎都會開啟任何文件,即使文件是來自不受信任的來源,因此攻擊者通常會在攻擊中選擇這些檔案來入侵系統。 在這個威脅簡報中,我們會展示 Office 文件如何被破壞和濫用,用來攻擊和危害 Windows 端點的五種不同方式,其中有些先前曾經發佈,有些則是新內容。 **巨集** 巨集是攻擊者將 Office 文件武器化來發動攻擊的最直接方式。Office 應用程式有可以執行 VBA (Visual Basic for Applications) 指令碼的內建指令碼引擎。這些指令碼會在文件開啟時立即執行,完全不需要任何使用者互動 (假設使用者先前已啟用巨集),而且會在系統上執行惡意程式碼。如果使用者未啟用巨集,則會出現快顯視窗,要求使用者按一下來執行巨集。快顯視窗是 Microsoft 新增的幾種安全機制之一,可降低巨集造成的安全風險。Microsoft 也會強制使用不同的檔案副檔名 (對於包含巨集的新文件,是 .docm 而非 .docx)。即使採取這些措施,使用者仍然可以選擇開啟這些檔案並啟用其中的內容,因此巨集仍然是常見的攻擊途徑,無論是大規模攻擊還是簡單的攻擊,可用於傳遞 [Emotet](https://autofocus.paloaltonetworks.com/#/tag/Unit42.Emotet) 之類的勒索軟體,並發動 [Sofacy 攻擊活動](https://www.paloaltonetworks.com/blog/2018/02/unit42-sofacy-attacks-multiple-government-entities/)之類的複雜攻擊。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2018/07/Threat-Brief_1-500x485.png) 圖 1.啟用內容前後的 Sofacy 文件 正如此範例所示,攻擊者會利用社交工程試圖說服使用者停用 Microsoft 新增的安全機制,說服使用者必須啟用內容才能看見完整的文件。在 Sofacy 範例中,攻擊者只是將字體顏色設定為白色,因此文字在使用者啟用巨集之前就已存在,只是不清晰可見。 **嵌入式 Flash 檔案** 除了巨集之類的內建功能之外,Office 文件也可以嵌入外部物件,例如 Adobe Flash 檔案。這些物件會傳遞到適當的軟體進行處理,因此,也可以將這些物件嵌入於 Office 文件的 Adobe Flash 內容來利用軟體的任何弱點。攻擊者利用這種攻擊途徑的其中一例是 ++[CVE-2018-4878](https://www.paloaltonetworks.com/blog/2018/02/unit42-traps-prevents-adobe-flash-player-zero-day/)++,這會在 Excel 文件中嵌入惡意 SWF 檔案,對 Adobe Flash Player 發動零時差攻擊。在這些類型的攻擊中,惡意 Excel 包含嵌入式 Adobe Flash 內容,這會觸發 Flash 弱點並執行嵌入的 shellcode。 **Microsoft 方程式編輯器** 以將 Adobe Flash 檔案嵌入到 Office 文件的類似方式,您也可以將方程式嵌入到將由 Microsoft 方程式編輯器剖析的文件中,這個程序可以讓您輕鬆撰寫數學方程式: ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2018/07/Threat-Brief_2-500x265.png) 圖 2.Microsoft 方程式編輯器 與前面的範例一樣,可以透過惡意 Office 文件來入侵方程式編輯器中的弱點。我們最近發現這方面的實例,++[CVE-2017-11882](https://www.paloaltonetworks.com/blog/2017/12/unit42-analysis-of-cve-2017-11882-exploit-in-the-wild/)++ 遭到大肆入侵,使 ++[CVD-2018-0802](https://www.paloaltonetworks.com/blog/2018/01/unit42-traps-prevents-microsoft-office-equation-editor-zero-day-cve-2017-11882/)++ 等弱點得以遭到入侵,這兩個入侵會利用方程式編輯器中的錯誤,攻擊者能夠藉此透過打開 Office 文件的使用者完成遠端程式碼執行。Unit 42 的研究人員還確認了 ++[CVE-2018-0807](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0807)++ 和 ++[CVE-2018-0798](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0798)++ 等類似的 Microsoft 方程式編輯器弱點,只是尚未發現這些弱點遭到入侵。 請注意,由於 Microsoft 方程式編輯器使用本身的程序 (eqnedt32.exe) 執行,因此在預設情況下,Microsoft Office 的特定保護 (例如 EMET 和 Windows Defender 惡意探索防護) 將失效,因為它們只會保護 Microsoft Office 程序 (例如 winword.exe)。 **OLE 物件和 HTA 處理程序** OLE 物件和 HTA 處理程序是 Office 文件進行參照而在其內容中包含其他文件所用的機制。它們可用於藉由下列方式危害端點: * Microsoft Word 文件已嵌入 OLE2 嵌入式連結物件 * 開啟文件後,Word 程序 (winword.exe) 會將 HTTP 要求發送到遠端伺服器,以擷取有惡意指令碼的 HTA 檔案 * 然後,winword.exe 將透過 COM 物件搜尋應用程式/hta 的檔案處理程序,這會導致 Microsoft HTA 應用程式 (mshta.exe) 載入並執行惡意指令碼 透過入侵 ++[CVE-2017-0199](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0199)++ (Microsoft 於 2017 年 9 月修補的 Microsoft Office/WordPad 遠端程式碼執行 (RCE) 弱點) 可利用此功能,而且可在多個攻擊活動 (例如這個 [OilRig 攻擊活動](https://www.paloaltonetworks.com/blog/2017/10/unit42-oilrig-group-steps-attacks-new-delivery-documents-new-injector-trojan/)) 中發揮作用。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2018/07/Threat-Brief_3.png) 圖 3.RTF 檔案看起來與一般的 Word 文件完全相同 除了先前的 OLE 和 HTA 入侵之外,攻擊者發現 RTF 檔案也可以使用 MSHTML 執行「text/html」mime 類型 OLE 物件。這表示 RTF 文件暴露出與 Internet Explorer 相同的攻擊範圍! 利用稱為 ++[CVE-2018-8174](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8174)++ 的這個邏輯弱點,攻擊者即可執行任意 HTML/JavaScript/VBScript。雖然以這種方式執行的程式碼經過「沙箱」處理 (無法執行新程序或寫入到檔案系統等等),不過,和從 Internet Explorer 執行的其他程式碼一樣,此錯誤可用於利用其他弱點,例如 VBScript 引擎中的記憶體損毀 UAF 弱點,在 Word 應用程式 (winword.exe) 的脈絡中獲得任意程式碼執行的權限,藉以控制系統。 **結語** 雖然文件式攻擊十多年來一直是很常見的攻擊途徑,但是我們最近發現這個途徑的受歡迎程度和複雜程度都在提升。這一結果的出現可能是由於瀏覽器開發人員不斷進行強化,使瀏覽器入侵變得更加困難。無論原因為何,組織都必須知道如何防範這些常見的技術。 **防禦** Palo Alto Networks Traps advanced endpoint protection 提供多種惡意軟體和入侵的防禦方法,可防範下列威脅: * 巨集檢查 - Traps 利用 WildFire 威脅情報雲以及本機機器學習的功能,檢查每個 Office 檔案中是否存在惡意巨集,而且可以防止使用者開啟惡意的檔案。 * 入侵防禦 - Traps 廣泛的入侵防禦功能可以阻止任何這些入侵嘗試在受攻擊的端點上成功執行惡意 shellcode。 * Traps 會持續監視 Office 應用程式,確保不會將合法的內建程序用於惡意流量。 *** ** * ** *** ## Related Blogs ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### Strata Copilot - 加速邁向自發性網路安全性的未來](https://www2.paloaltonetworks.com/blog/network-security/introducing-strata-copilot/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 醫療企業是勒索軟體攻擊者的首要目標](https://www2.paloaltonetworks.com/blog/2021/10/healthcare-organizations-are-the-top-target/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 適用於 5G 的零信任:實現安全的數位轉型](https://www2.paloaltonetworks.com/blog/2021/10/zero-trust-for-5g-digital-transformation/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 網路攻擊鎖定金融服務企業的 3 個原因以及防禦方式](https://www2.paloaltonetworks.com/blog/2021/10/financial-services-cyberattacks/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### 連續 7 年提供出色的客戶服務](https://www2.paloaltonetworks.com/blog/2021/10/delivering-outstanding-customer-service/?lang=zh-hant) ### [未分類](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e9%a1%9e/?lang=fr&ts=markdown) [#### Palo Alto Networks 研究:61% 的企業難以確保在家工作的遙距網絡安全](https://www2.paloaltonetworks.com/blog/2021/09/state-of-hybrid-workforce-security-2021/?lang=zh-hant) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language