8/16/2019 BadWinmail and Email Security Outlook Final
1/47
• Haifei Li ([email protected])
• Chong Xu ([email protected])
BadWinmail and Email Security on Outlook
8/16/2019 BadWinmail and Email Security Outlook Final
2/47
About Us - Haifei
• Security Researcher @ Intel Security (formerly McAfee)
• Previously: Microsoft, Fortinet• Work on 2 questions (for good purposes):
1) how to find vulnerabilities?2) how to exploit them?
At McAfee my interests have been extended to the 3rd
:3) how to detect the effect by answering the 1st & 2nd ?
work on research-backed projects aimed to detect the moststeady (zero-day) exploits
• Presented stuff some times (BlackHat Europe 2010, REcon2012, Syscan360 2012, CanSecWest 2011/2014/2015,Black Hat USA 2015)
8/16/2019 BadWinmail and Email Security Outlook Final
3/47
About Us - Chong
• Ph.D from Duke University
• Senior Director @ Intel Security
• Focus• Advanced (0-day) exploit and malware defense
• APT detection • Threat intelligence• Innovation• Next generation network/host solutions
8/16/2019 BadWinmail and Email Security Outlook Final
4/47
Agenda
A Look Back at Outlook Security
The Journey of the BadWinmail Discovery
How Bad Is It?
The Fix
Outlook vs. Email Attachments
Conclusion
8/16/2019 BadWinmail and Email Security Outlook Final
5/47
Outlook is a key application in enterprise
environment Not just exchanging emails
Meetings / personal information
Sharing files (shared folder), integrated w/ Lync
(now called Skype for Business) Probably more commonly used than browsers
It’s the most direct way that an attacker can
reach into your enterprise, by sending emails Behind the firewalls
Highly targeted victim
Outlook security deserves attention
Outlook 101
8/16/2019 BadWinmail and Email Security Outlook Final
6/47
CVE-2014-2730, April, 2014 DoS only in parsing XML; not really exploitable No MS patch info found
CVE-2013-3905, Nov, 2013 Info-disclosure in handing X.509 certificate, e.g. allow port-scan in
internal network
Fixed in MS13-094CVE-2013-3870, Sep, 2013
Double-free in handling nested S/MIME certificates; potentially allow
RCE, but most unlikely to exploit, as explained in
http://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-
difficult-to-exploit-double-free-in-outlook.aspx
Fixed in MS13-068
CVE-2013-0095, March, 2013 Outlook for MAC only, crafted HTML email will use Webkit engine to
render remote web content automatically; allow info-leak (whether
the victim read the email or not).
Fixed in MS13-026
Outlook Bugs in Recent Years
http://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspxhttp://blogs.technet.com/b/srd/archive/2013/09/10/ms13-068-a-difficult-to-exploit-double-free-in-outlook.aspx
8/16/2019 BadWinmail and Email Security Outlook Final
7/47
CVE-2010-2728, Sep, 2010 Heap-based overflow in parsing TNEF format; seems not easy to
exploit.
Fixed in MS10-064
CVE-2010-0266, July, 2010 Logical fault in verifying file types when user opens email
attachments; requires few user interaction, but easy to exploit (still
very dangerous).
Fixed in MS10-045
CVE-2010-0816, May, 2010 Integer overflow in handling POP3 response; only in Outlook Express
edition.
Fixed in MS10-030
It’s just an email client that has seen few
vulnerabilities in recent years, how insecure
can it be? But…
Outlook Bugs in Recent Years
8/16/2019 BadWinmail and Email Security Outlook Final
8/47
Agenda
A Look Back at Outlook Security
The Journey of the BadWinmail Discovery
How Bad Is It?
The Fix
Outlook vs. Email Attachments
Conclusion
8/16/2019 BadWinmail and Email Security Outlook Final
9/47
Embedding a document in another document
Just double-clicking on the “checklist” documents,
readers open another document
Let’s Talk About OLE First
8/16/2019 BadWinmail and Email Security Outlook Final
10/47
OLE provides the majority of interoperability
functions in Office It’s just a subset of COM
2 types of OLE objects In-process OLE (in-process COM), loaded via
ole32!OleLoad()
Separate-process OLE (separate-process COM), loaded
via ole32!OleRun()
What’s OLE?
COM
OLE
8/16/2019 BadWinmail and Email Security Outlook Final
11/47
We have explained the OLE (for in-process OLE)
internals as well as the attack surface at Black HatUSA 2015. https://sites.google.com/site/zerodayresearch/Attacking_Intero
perability_OLE_BHUSA2015.pdf , which has been referenced
by many researchers as it has helped their research
against Office-based threats
Our BlackHat talk is about OLE on
Word/PowerPoint/Excel/WordPad only, i.e., it’s forWord/PowerPoint/Excel documents and RTF file formats
But OLE has wider existence!
What’s OLE?
https://sites.google.com/site/zerodayresearch/Attacking_Interoperability_OLE_BHUSA2015.pdfhttps://sites.google.com/site/zerodayresearch/Attacking_Interoperability_OLE_BHUSA2015.pdfhttps://sites.google.com/site/zerodayresearch/Attacking_Interoperability_OLE_BHUSA2015.pdfhttps://sites.google.com/site/zerodayresearch/Attacking_Interoperability_OLE_BHUSA2015.pdfhttps://sites.google.com/site/zerodayresearch/Attacking_Interoperability_OLE_BHUSA2015.pdf
8/16/2019 BadWinmail and Email Security Outlook Final
12/47
We may receive an email similar to this
This is an Excel Spreadsheet “embedded” in the email body,
not as an attachment as we usually see
OLE in Outlook
8/16/2019 BadWinmail and Email Security Outlook Final
13/47
This email can be saved as “.msg,” which has the binary as
If you have dealt with OLE in other Office formats before, you
see an OLE object structure here!
OLE in MSG
8/16/2019 BadWinmail and Email Security Outlook Final
14/47
Microsoft “[MS-OXMSG].pdf ” tells us the secrete
There’s even an example in the specification
OLE in MSG
8/16/2019 BadWinmail and Email Security Outlook Final
15/47
It seems like an OLE object stored in the MSG file format
Using the knowledge from our BH presentation, we
Changed the CLSID of the “_substg1.0_3701000D” Storage
to Flash OLE CLSID D27CDB6E-AE6D-11cf-96B8-444553540000
Manually injected a “Contents” stream containing the flash exploit into
the .msg file.
OLE in MSG
8/16/2019 BadWinmail and Email Security Outlook Final
16/47
When the .msg was opened in Outlook, the exploit is triggered,
i.e., the content stream is loaded by Flash OLE’s
IPersistentStorage::Load() function, which triggers the exploit.
OLE in MSG
8/16/2019 BadWinmail and Email Security Outlook Final
17/47
At this point, it’s pretty sure that this is a really
dangerous (and previously-unknown) attack vector, ora novel “exploit delivering method.”
Attackers may attach the .msg file in an email, and
send it to the victim, as long as the victim previewthe .msg attachment, the “embedded” Flash exploit
will run! .msg attachment is considered as “safe” file type by
Outlook – Outlook even uses itself to preview .msg
attachment
Attack Scenario of OLE in MSG
8/16/2019 BadWinmail and Email Security Outlook Final
18/47
We know Flash OLE object could be loaded
It’s reasonable to guess more OLE objects could beloaded in Outlook
Indeed, such as: Adobe Flash (pwning via Flash 0day)
Adobe Reader (pwning via PDF 0day?)
etc
More OLE Objects Under Attack
8/16/2019 BadWinmail and Email Security Outlook Final
19/47
Wait! Is that all?
About the time I was going to send the report toMicrosoft, I happened to read this “clue” webpage https://support.microsoft.com/en-us/kb/241538
Turns out TNEF (the winmail.dat) supports OLE too!
After some investigation, I found
OLE in TNEF
https://support.microsoft.com/en-us/kb/241538https://support.microsoft.com/en-us/kb/241538https://support.microsoft.com/en-us/kb/241538https://support.microsoft.com/en-us/kb/241538https://support.microsoft.com/en-us/kb/241538
8/16/2019 BadWinmail and Email Security Outlook Final
20/47
Remember when someone sent you a strange attachment named
“winmail.dat” and you have no idea how to open it?
Winmail.dat
8/16/2019 BadWinmail and Email Security Outlook Final
21/47
TNEF is another Microsoft-invented email file format,
described in “[MS-OXTNEF].pdf ”
It’s a binary file format (like MSG), but it will be parsed
directly as long as the user reads the email! (MSG could only
be sent as email attachments)
Following is a sample .eml (which could be sent via email
protocols) that contains OLE.
OLE in TNEF
8/16/2019 BadWinmail and Email Security Outlook Final
22/47
Here is what a TNEF file looks like (after the
decoding from .eml file)
0x223E9F78 is the Magic Number
OLE in TNEF
8/16/2019 BadWinmail and Email Security Outlook Final
23/47
Looking at the whole data of the file, we find some
“interesting” bytes in that “TNEF” winmail.dat
D0 CF 11 E0 A1 B1 1A E1 => the Magic Number for a
“OLE Structured Storage” (OLESS)
With the help of the identifying the “length” fields marked
with red, we were able to dump the OLESS stream
OLE in TNEF
8/16/2019 BadWinmail and Email Security Outlook Final
24/47
The dumped OLESS could be opened/edited by many
“structured storage” tools Here I used the open-sourced OpenMcdf
Isn’t it the same as in MSG?
OLE in TNEF
8/16/2019 BadWinmail and Email Security Outlook Final
25/47
We can play the old trick as how we “hacked” the
MSG Modify the CLSID to Flash OLE’s CLSID
Add a “Contents” stream, put our exploit there
After that Re-pack the modified OLESS into winmail.dat
Remember to update the “length” fields
Encod (base64) that winmail.dat into an email file
Send that email via email protocols
OLE in TNEF
8/16/2019 BadWinmail and Email Security Outlook Final
26/47
And when Outlook receives that TNEF email
It Worked!
8/16/2019 BadWinmail and Email Security Outlook Final
27/47
As mentiond, TNEF specification is actually well described in
“[MS-OXTNEF].pdf ”
Our exercise is to modify an existing TNEF email sample; butone can build the TNEF file with his own
In order to let TNEF render the attachment (it’s another
concept than the “email attachment”) as OLE object, the
“ AttachTypeFile” should be set to 0x02 (AttachTypeOLE)
This could be used to detect TNEF email that contains OLE
objects
OLE in TNEF
8/16/2019 BadWinmail and Email Security Outlook Final
28/47
Agenda
A Look Back at Outlook Security
The Journey of the BadWinmail Discovery
How Bad Is It?
The Fix
Outlook vs. Email Attachments
Conclusion
8/16/2019 BadWinmail and Email Security Outlook Final
29/47
Users get pwned as long as they just read the email No matter you preview the email or start a new window to read
email in Outlook
Flash is installed on most Windows It’s installed by default on every Windows 8, 8.1, 10!
On Windows 7, just need the victim to install the Flash ActiveX
version (for IE) Note: Flash is not the only one object Outlook can load, as we
have discussed before
Having a reliable Flash zero-day exploit, is fairly easy
for someone who wants to launch a targeted attack Up to 50,000 USD (according to Zerodium) Read various other industry posts/papers/presentations talking
about how many Flash zero-days they analyzed and how many
Flash CVEs they’ve found
It’s Really Bad
8/16/2019 BadWinmail and Email Security Outlook Final
30/47
There’s no sandbox on Outlook! Yes, you read it right, for such an important app!
Getting code execution in Outlook = taking control of the
computer
Due to the nature of email-based attack, it’s an idealway to launch highly-targeted attack What is a real APT? This is
It’s wormable! When hacked one computer via email, the worm may gather
all the contacts and then sends the same exploit through
email to all the contacts to spread itself
It doesn’t usually happen in Windows ecosystem nowadays
It’s Really Bad
8/16/2019 BadWinmail and Email Security Outlook Final
31/47
Agenda
A Look Back at Outlook Security
The Journey of the BadWinmail Discovery
How Bad Is It?
The Fix
Outlook vs. Email Attachments
Conclusion
8/16/2019 BadWinmail and Email Security Outlook Final
32/47
Disclosure Timeline The issue was reported to MSRC in late October 2015
Fix was released on December 8th, 2015 during PatchTuesday (CVE-2015-6172, MS15-131) MSRC and the Office team patched it within 1.5 months,
fastest patching speed I’ve ever seen.
80+ email exchanges were made for this case, including 1
online meeting 2 “face-to-face status updates”
Thanks to Jason Shirk (MSRC) for coming to Vancouver
Per request, paper and demo were released 1 week (on
December 15th) after the patch, allowing more people to install
the patch
The paper was released at: https://sites.google.com/site/zerodayresearch/BadWinmail.pdf
The Disclosure Thing
https://sites.google.com/site/zerodayresearch/BadWinmail.pdfhttps://sites.google.com/site/zerodayresearch/BadWinmail.pdf
8/16/2019 BadWinmail and Email Security Outlook Final
33/47
I wrote a script monitoring the email samples we have
to see if there’s an ITW BadWinmail attack The usual “threat intelligence” thing Glad no alert so far
There were reports of some samples detected by AV,
they are FP
I’d like to share my view on patch
After the Fix
“
8/16/2019 BadWinmail and Email Security Outlook Final
34/47
I spent time on this because I saw a “weird” thing After the fix, my PoC still loads the Flash binary!
Isn’t the best patch blocking Outlook from loading Flash
binary at all?
So I fired my debugger, and confirmed that the
CoCreateInstance(CLSID_Flash,..) is indeed called
The “weird” Fix
mso!Ordinal4312+0xa5b:64c7a954 ff15cc1ac464 call dword ptr [mso!Ordinal10691+0x1acc
(64c41acc)] ds:0023:64c41acc={ole32!CoCreateInstance (76039d0b)}
0:000> db poi(esp) L10
0012ac64 6e db 7c d2 6d ae cf 11-96 b8 44 45 53 54 00 00
Th “ i d” Fi
8/16/2019 BadWinmail and Email Security Outlook Final
35/47
So, what’s going on? But, our exploit is indeed not working!
So I step-by-step debugging from the
CoCreateInstance, and found that After the CoCreateInstance (which loads the binary)
and before the IPersistStorage::Load() (which loadsour Flash exploit), a check was added (in wwlib.dll)
The new check blocks the OLE initialization process
(IPersistStorage::Load()) to prevent exploit from being
loaded
The “weird” Fix
8/16/2019 BadWinmail and Email Security Outlook Final
36/47
Th “ i d” Fi
8/16/2019 BadWinmail and Email Security Outlook Final
37/47
The 0x00000040 bit is set here
Confirming this is easy - when we reset the bit
to 0 in memory, our exploit works again
The “weird” Fix
Th “ i d” Fi
8/16/2019 BadWinmail and Email Security Outlook Final
38/47
Some takeaways from our diggings in the fix
This fix is “weird” because that after the fix, the Flashbinary is supposed to not be loaded in the Outlook
process at all
However, this fix is effective anyway
There’s 1 bit in the memory controlling the feature We believe this is app-depended, which means as
long as the “container” is Outlook, OLE object
shouldn’t be initialized
We currently don’t know if the bit is from any Outlook
customization settings (like from Registry)
The “weird” Fix
8/16/2019 BadWinmail and Email Security Outlook Final
39/47
Agenda
A Look Back at Outlook Security
The Journey of the BadWinmail Discovery
How Bad Is It?
The Fix
Outlook vs. Email Attachments
Conclusion
O tl k Att h t b d Th t
8/16/2019 BadWinmail and Email Security Outlook Final
40/47
Outlook is not just a normal app, in fact, it’s a “threat
entrance” for many organizations Victims often get hacked starting from malicious attachments Do you know the BlackEnergy trojan that caused the Ukraine
electric power outage was started from a Macro-
embedded .xls attachment?
Office documents are supposed to be opened in the“Protected View” mode by default It’s a strong sandbox, according to this MWR research
So, in the BlackEnergy case, the victim did 1) Click the “Enable Editing” to disable the Protected View (PV)
2) Click the “Enable Content” to enable the embedded Macro
Outlook vs. Attachment-based Threats
Th P bl
http://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industryhttp://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industryhttps://labs.mwrinfosecurity.com/system/assets/1015/original/Understanding_The_Microsoft_Office_2013_Protected_View_Sandbox.pdfhttps://labs.mwrinfosecurity.com/system/assets/1015/original/Understanding_The_Microsoft_Office_2013_Protected_View_Sandbox.pdfhttp://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industryhttp://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industryhttp://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industryhttp://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industryhttp://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industryhttp://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry
8/16/2019 BadWinmail and Email Security Outlook Final
41/47
But, we found that sometimes in domain-joined environment,
Office attachments will be opened w/o the Protected View!
Outlook + Exchange Server, domain-joined Typical environment for many organizations use Microsoft
solutions
If the attachment is sent within the organization, no Protected
View e.g., [email protected] sends a .docx to [email protected]
For external senders, we’ve seen all the 3 possibilities: Attachments from all external senders will be opened in PV
If the external sender is a “known” address for the user, no PVotherwise there is PV
Attachments from all external senders will be opened w/o PV
We’d like to thank Randy Zhong (@randy_zhong), Steeve Barbeau (@steevebarbeau), and
Dennis Dwyer (@dunit50) for helping us on testing the behavior.
The Problem
It’ E t d B h i
mailto:[email protected]:[email protected]:[email protected]:[email protected]
8/16/2019 BadWinmail and Email Security Outlook Final
42/47
Microsoft knows this already The r egistry key, “MarkInternalAsUnsafe”, when set,
forces users to open any Office files in Protected View
mode (https://support.microsoft.com/en-us/kb/2714439)
However, the flag is not set by default.. Remember, when we talk about security issues, we need
to think from average users
According to our tests, no organization sets this flag for
their employees
It’s an Expected Behavior..
Th Ri k
https://support.microsoft.com/en-us/kb/2714439https://support.microsoft.com/en-us/kb/2714439https://support.microsoft.com/en-us/kb/2714439https://support.microsoft.com/en-us/kb/2714439https://support.microsoft.com/en-us/kb/2714439https://support.microsoft.com/en-us/kb/2714439
8/16/2019 BadWinmail and Email Security Outlook Final
43/47
In simple word, Outlook doesn’t protect against inside
threats by default For example, If one employee (could be anyone) gets
hacked, the attacker could use his/her email account to
send a malicious Office exploit to the CEO, which allows
the threat actor to hack the CEO’s computer much easier
Did you know the Hacking Team use Flash exploitembedding in Office documents? It will work in this case
Regarding external emails, we’d like to call IT
administrators to perform their own tests As we have seen different organizations act differently Probably depending on the Exchange Server versions or
some configurations on Exchange Server
The Risks
8/16/2019 BadWinmail and Email Security Outlook Final
44/47
Agenda
A Look Back at Outlook Security
The Journey of the BadWinmail Discovery
How Bad Is It?
The Fix
Outlook vs. Email Attachments
Conclusion
C l i
8/16/2019 BadWinmail and Email Security Outlook Final
45/47
BadWinmail was an ideal attacking technique for
targeted/APT attacks, and it’s wormable
No Protected View for internal emails pose a real-world
security concern
Outlook is not secure as you think (even after Badwinmail)
Exploitation - Outlook does not have a Sandbox!
The attack surface is actually pretty wide Outlook supports many formats, most are binary formats, namely
MSG/TNEF/RPMSG (fuzzing is needed!)
A lot of features most people don’t know yet, features bring bugs
We don’t know Outlook supports OLE before
Outlook is highly-integrated with the Office system, i.e., they share
a lot of libraries, which means vulnerabilities in other Office apps
may affect Outlook too
Conclusion
Major References
8/16/2019 BadWinmail and Email Security Outlook Final
46/47
[1] Haifei Li and Bing Sun, “Attacking Interoperability: An OLE Edition” [Online]
https://sites.google.com/site/zerodayresearch/Attacking_Interoperability_OLE_BHUSA2015.pdf
[2] Microsoft, “[MS-OXMSG]: Outlook Item (.msg) File Format” [Online]https://msdn.microsoft.com/en-us/library/cc463912(v=exchg.80).aspx
[3] Microsoft, “Description of Transport Neutral Encapsulation Format (TNEF) in Outlook 2000”, [Online]
https://support.microsoft.com/en-us/kb/241538
[4] Microsoft, “[MS-OXTNEF]: Transport Neutral Encapsulation Format (TNEF) Data Algorithm”, [Online]
https://msdn.microsoft.com/en-us/library/cc425498(v=exchg.80).aspx
[5] Haifei Li, “BadWinmail: The "Enterprise Killer" Attack Vector in Microsoft Outlook” [Online]
https://sites.google.com/site/zerodayresearch/BadWinmail.pdf
[6] Robert Lipovsky and Anton Cherepanov, “BlackEnergy trojan strikes again: Attacks Ukrainian
electric power industry” [Online]
http://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-
power-industry
[7] Microsoft, “Office document attachments open in Protected View in Outlook” [Online]
https://support.microsoft.com/en-us/kb/2714439
Major References
8/16/2019 BadWinmail and Email Security Outlook Final
47/47
Thank You!
Top Related