Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Scams & Phishing Security Education Videos Mobile Security Your Security Education Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Sneaky Email Phishing Uses Corrupt MS Word Files
Facebook   X   LinkedIn   Email

Sneaky Email Phishing Uses Corrupt MS Word Files

June 27, 2025

Always looking for new ways to swindle us, hackers are using purposely corrupted Word files to hook unsuspecting users. The success rate of this email phishing attack is nearly 100%, so knowing what to look for before you get hooked can help prevent this latest cybercrime.

Sneak Attack

Any.Run, a malware hunting firm, found corrupt Word files attached to emails. Intentionally corrupted by hackers, they know the files will sneak past Microsoft’s malware checks. The files pretend to be from human resource and payroll departments, using bonuses and/or benefits as lures, making it even more difficult to determine if they should be opened. They even use legitimate company branding. Very tricky.

Even worse, this scam uses Microsoft’s own document recovery feature to open the corrupt file. Once it’s restored, victims see an embedded QR code. Scanning the QR code leads to a fake Microsoft login page or a phishing website, with both designed to steal your credentials.

Phishing Cyber-Smarts

With 91% of malware delivered via phishing, this latest scam shines a bright light on the importance of verifying the email sender before taking any other actions. Alerting a network administrator or human resources will verify if it’s for real. Below are more phishing cyber-smarts to follow.

  • Verify the sender before clicking on attachments or links. A simple phone call will do.
  • Be wary of generic greetings, misspellings, grammatical errors, or bad graphics.
  • Pressure to act fast is a hacker calling card. Take the time to check it out.
  • Beware emails requiring you to verify personal or financial information. When in doubt, don’t.
  • Use common sense. If you have any second thoughts about an email, it's better off deleted.

With new phishing threats seeming to pop-up at the speed of light, it’s on everyday users to put up a defense. Not only do we need to protect against the scams we know about, but also those in the making. That’s where phishing cyber-smarts make a real difference with your online security—and peace of mind.


Are You Hacker-Bait? Phishing Malware Lets Picky Attackers Decide

Scams & Phishing

Are You Hacker-Bait? Phishing Malware Lets Picky Attackers Decide

If you’ve ever wondered if you’re a juicy target for a cyberattack, don’t fret because there’s a new malware allowing bad actors to decide that for you. It’s a creepy thought, but there’s a new email phishing campaign installing malware that takes screenshots of a device and its contents and sends them to the hacker. If the data is deemed hack-worthy, it’s the beginning of a financial nightmare for the chosen victims. Heavily targeting organizations in the U.S., Proofpoint researchers began tracking this phishing campaign last year and find it continues today. READ FULL STORY

Keeping Your Bank Account And Credit Cyber-Smart

Education

Keeping Your Bank Account And Credit Cyber-Smart

Financial institutions and hacking go hand-in-hand. Hacking banks and their account holders is the most direct cash infusion a hacker can get…and they know it. According to Kaspersky Lab, attacks on ATMs alone hit an all-time high in 2017 with malware-as-a-service (MAAS) opportunities. With this service, even hacking “hacks” who have no cybercrime experience can watch an instructional “how to” video on how to target an ATM successfully. Guarding our finances with common sense protection is something we all need to do. READ FULL STORY

BOLO for These Most Dangerous Email Attachments

Scams & Phishing

BOLO for These Most Dangerous Email Attachments

Keeping a lookout for suspicious emails has become a daily consequence of our cyber lives. Phishing emails are notorious for having malicious attachments and opening them is a sure way to compromise your device and its data. These attachments are full of malware, ready and waiting to infect your system with a simple click. Make no mistake, any attachment in a questionable email can be dangerous. However, researchers at F-Secure found that some of this year’s biggest email spam campaigns used particular types of malicious attachments more than others. READ FULL STORY

Common Signs Of Phishing To Keep In Mind When Your Inbox Overflows

Scams & Phishing

Common Signs Of Phishing To Keep In Mind When Your Inbox Overflows

With email phishing, deciphering what’s real from what’s fake can be a challenge. Our inboxes are stuffed with emails fighting to get our attention and get us to take some action. But how to ferret-out what’s legitimate takes some cyber-smarts. Research shows email is the primary method of spreading 92% of all malware, and the U.S. is the target of 86% of all email phishing attacks. Whether at home or at work, email phishing is relentless, but being aware of characteristics they have in common can be a powerful tool. READ FULL STORY

Crypto Wallets Hacked Through Windows Vulnerability

Mobile Security

Crypto Wallets Hacked Through Windows Vulnerability

The security of crypto wallets has been a question mark for some time. And now, there's a Windows vulnerability leaving users infected with a previously unknown infostealer that's draining crypto wallets. It's called Phemedrone Stealer and malicious campaigns are exploiting this Windows vulnerability to steal crypto wallet contents and other sensitive information from victims. The attackers use malicious .url files to download and exploit the vulnerability that bypasses checks and warnings from Microsoft Defender. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...