Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Researchers Detailed Techniques to Detect Outlook NotDoor Backdoor Malware

Researchers Detailed Techniques to Detect Outlook NotDoor Backdoor Malware

Posted on November 17, 2025November 17, 2025 By CWS

Outlook NotDoor backdoor malware first appeared in menace campaigns recognized by Lab52, the intelligence arm of Spanish agency S2 Grupo.

Linked to APT28/Fancy Bear, NotDoor leverages malicious Outlook macros for persistent entry and information theft. Attackers embed these macro payloads inside Outlook’s information recordsdata to watch incoming emails and set off hidden code on contaminated programs.

This has enabled superior persistent menace teams to quietly exfiltrate recordsdata, execute instructions, and preserve stealthy management by abusing a trusted software.

Preliminary compromise usually begins with DLL sideloading. Risk actors place a maliciously crafted SSPICLI.dll subsequent to the official OneDrive.exe, exploiting how Home windows prioritizes loading DLLs.

The faux DLL permits the actor to execute instructions and stage malware parts with out elevating alarms.

An infection artifacts embody a number of recordsdata: an actual OneDrive.exe, SSPICLI.dll (malicious), tmp7E9C.dll (renamed official DLL), and testtemp.ini containing the VBA macro. These particulars are essential for defenders monitoring suspicious file occasions and Registry modifications.

Splunk safety researchers had been among the many first to completely analyze NotDoor. Their deep dive revealed encoded PowerShell instructions launched by OneDrive.exe and the way the malware quietly creates TEMP directories for dropped artifacts.

The detection information by Splunk helps defenders acknowledge rogue processes spawning PowerShell, community calls, and registry adjustments that activate macro auto-loading, disable safety prompts, or enable all macros with out warning.

This analysis supplies helpful blueprints for constructing dependable detection.

Outlook Macro Persistence and Obfuscation

A key NotDoor approach includes copying the macro-laden testtemp.ini file to Outlook’s VBAProject.OTM location throughout the consumer’s Roaming listing.

This file holds all customized automation and email-handling macros for Outlook. Below regular circumstances, solely Outlook ought to write right here, so any exterior course of (akin to malware) is very suspicious.

The macro backdoor units up C2 communications: it could obtain and execute attacker directions through e-mail triggers, and quietly ship information again out.

It depends on obfuscation, randomized variable names, and customized encoding to slide previous easy scans. Splunk researchers pinpointed registry modifications as pivotal for persistence.

The malware adjustments settings to mechanically load the malicious macro at startup (LoadMacroProviderOnBoot) and lowers Outlook’s macro safety stage to let all macros execute, suppressing safety dialogs.

The next code snippet reveals a standard Splunk detection seek for registry adjustments:-

tstats security_contents_summaries_only depend FROM datamodelEndpoint.Registry WHERE Registry.registrypath=HKCUSoftware programMicrosoftWorkplaceOutlookSafetyLoadMacroProviderOnBoot Registry.registryvaluedata=0x00000001

Outlook Safety Registry Modifications (Supply – Splunk)

Defenders can observe these Splunk detection fashions to catch NotDoor malware, waiting for macro file occasions and registry modifications that sign an infection and persistence.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Backdoor, Detailed, Detect, Malware, NotDoor, Outlook, Researchers, Techniques

Post navigation

Previous Post: North Korean Hackers Infiltrated 136 U.S. Companies to Generate $2.2 Million in Revenue
Next Post: Widespread Exploitation of XWiki Vulnerability Observed

Related Posts

OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely Cyber Security News
Windows Cloud Files Mini Filter Driver 0-Day Vulnerability Exploited in the Wild to Escalate Privileges Windows Cloud Files Mini Filter Driver 0-Day Vulnerability Exploited in the Wild to Escalate Privileges Cyber Security News
MonetaStealer Malware Powered with AI Code Attacking macOS Users in the Wild MonetaStealer Malware Powered with AI Code Attacking macOS Users in the Wild Cyber Security News
Belarusian Spyware ResidentBat Targets Journalists with Precision Belarusian Spyware ResidentBat Targets Journalists with Precision Cyber Security News
Caminho Loader-as-a-Service Using Steganography to Conceal .NET Payloads within Image Files Caminho Loader-as-a-Service Using Steganography to Conceal .NET Payloads within Image Files Cyber Security News
FEMITBOT Network Abuses Telegram for Crypto Scams FEMITBOT Network Abuses Telegram for Crypto Scams Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark