Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Researchers Detailed Techniques to Detect Outlook NotDoor Backdoor Malware

Researchers Detailed Techniques to Detect Outlook NotDoor Backdoor Malware

Posted on November 17, 2025November 17, 2025 By CWS

Outlook NotDoor backdoor malware first appeared in menace campaigns recognized by Lab52, the intelligence arm of Spanish agency S2 Grupo.

Linked to APT28/Fancy Bear, NotDoor leverages malicious Outlook macros for persistent entry and information theft. Attackers embed these macro payloads inside Outlook’s information recordsdata to watch incoming emails and set off hidden code on contaminated programs.

This has enabled superior persistent menace teams to quietly exfiltrate recordsdata, execute instructions, and preserve stealthy management by abusing a trusted software.

Preliminary compromise usually begins with DLL sideloading. Risk actors place a maliciously crafted SSPICLI.dll subsequent to the official OneDrive.exe, exploiting how Home windows prioritizes loading DLLs.

The faux DLL permits the actor to execute instructions and stage malware parts with out elevating alarms.

An infection artifacts embody a number of recordsdata: an actual OneDrive.exe, SSPICLI.dll (malicious), tmp7E9C.dll (renamed official DLL), and testtemp.ini containing the VBA macro. These particulars are essential for defenders monitoring suspicious file occasions and Registry modifications.

Splunk safety researchers had been among the many first to completely analyze NotDoor. Their deep dive revealed encoded PowerShell instructions launched by OneDrive.exe and the way the malware quietly creates TEMP directories for dropped artifacts.

The detection information by Splunk helps defenders acknowledge rogue processes spawning PowerShell, community calls, and registry adjustments that activate macro auto-loading, disable safety prompts, or enable all macros with out warning.

This analysis supplies helpful blueprints for constructing dependable detection.

Outlook Macro Persistence and Obfuscation

A key NotDoor approach includes copying the macro-laden testtemp.ini file to Outlook’s VBAProject.OTM location throughout the consumer’s Roaming listing.

This file holds all customized automation and email-handling macros for Outlook. Below regular circumstances, solely Outlook ought to write right here, so any exterior course of (akin to malware) is very suspicious.

The macro backdoor units up C2 communications: it could obtain and execute attacker directions through e-mail triggers, and quietly ship information again out.

It depends on obfuscation, randomized variable names, and customized encoding to slide previous easy scans. Splunk researchers pinpointed registry modifications as pivotal for persistence.

The malware adjustments settings to mechanically load the malicious macro at startup (LoadMacroProviderOnBoot) and lowers Outlook’s macro safety stage to let all macros execute, suppressing safety dialogs.

The next code snippet reveals a standard Splunk detection seek for registry adjustments:-

tstats security_contents_summaries_only depend FROM datamodelEndpoint.Registry WHERE Registry.registrypath=HKCUSoftware programMicrosoftWorkplaceOutlookSafetyLoadMacroProviderOnBoot Registry.registryvaluedata=0x00000001

Outlook Safety Registry Modifications (Supply – Splunk)

Defenders can observe these Splunk detection fashions to catch NotDoor malware, waiting for macro file occasions and registry modifications that sign an infection and persistence.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Backdoor, Detailed, Detect, Malware, NotDoor, Outlook, Researchers, Techniques

Post navigation

Previous Post: North Korean Hackers Infiltrated 136 U.S. Companies to Generate $2.2 Million in Revenue
Next Post: Widespread Exploitation of XWiki Vulnerability Observed

Related Posts

Sprocket Security Appoints Eric Sheridan as Chief Technology Officer Sprocket Security Appoints Eric Sheridan as Chief Technology Officer Cyber Security News
Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network Cyber Security News
INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskillin INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskillin Cyber Security News
Android Photo Frames App Downloads Malware, Giving Hackers Control of The Device Without User Interaction Android Photo Frames App Downloads Malware, Giving Hackers Control of The Device Without User Interaction Cyber Security News
Multiple GitLab Vulnerabilities Let Attackers Trigger DoS Attacks Multiple GitLab Vulnerabilities Let Attackers Trigger DoS Attacks Cyber Security News
State-Backed Hackers Exploit Signal to Target Officials State-Backed Hackers Exploit Signal to Target Officials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News