as subject
This thread was automatically locked due to age.
as subject
Hello Timothy,
Thank you for contacting the Sophos Community. Sophos has released the following news article regarding this vulnerability.
- https://nakedsecurity.sophos.com/2021/09/08/windows-zero-day-mshtml-attack-how-not-to-get-booby-trapped/
Within the article the following AV detection names are outlined. You can also see "CXmail/CXweb" detections generated from matching files.
Exp/2140444-A
Troj/JSExp-W
Troj/Cabinf-A
Troj/Agent-BHRO
Troj/Agent-BHPO &
Intercept X has a behavioral detection that corresponds with the behavior of the exploit itself.
Any web-servers seen in the attacks will have their IP addresses re-classified as "C2" destinations, or "Malware/Callhome".