Dissecting Office Malware for Fun and Espionage

  • Wednesday, April 22, 2015 | 8:00 AM – 8:50 AM | West | Room: 3018

View all Sessions

Microsoft Office documents are becoming the attack vector of choice for nation-state cyber espionage, like Stuxnet and Duqu. It’s no wonder, given that they have a 6546 page spec so complicated that Google estimated it would take 18 years to study it properly. Learn Office’s internals and how attackers use it to deliver malware, steal IP, and perform long distance espionage.


This document was retrieved from on Thu, 18 Jul 2019 22:46:14 -0400.