Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API."
https://thehackernews.com/2025/09/ta558-uses-ai-generated-scripts-to.html
https://securelist.com/revengehotels-attacks-with-ai-and-venomrat-across-latin-america/117493/
https://securelist.com/vulnerabilities-and-exploits-in-q2-2025/117333/
https://securelist.com/vulnerabilities-and-exploits-in-q1-2025/116624/
https://www.darkreading.com/cyberattacks-data-breaches/sidewinder-apt-spying-indias-neighbor-govts
https://thehackernews.com/2025/05/south-asian-ministries-hit-by.html
https://thehackernews.com/2025/03/clearfake-infects-9300-sites-uses-fake.html
https://securelist.com/vulnerabilities-and-exploits-in-q4-2024/115761/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/the-stealthy-stalker-remcos-rat/
https://securelist.com/exploits-and-vulnerabilities-q3-2024/114839/
https://www.infosecurity-magazine.com/news/smokeloader-malware-taiwan/
https://www.fortinet.com/blog/threat-research/sophisticated-attack-targets-taiwan-with-smokeloader
https://thehackernews.com/2024/11/cybercriminals-use-excel-exploit-to.html
https://securityaffairs.com/170791/security/a-new-fileless-variant-of-remcos-rat-phishing.html
https://thehackernews.com/2024/10/free-sniper-dz-phishing-tools-fuel.html
https://securityonline.info/fileless-remcos-rat-campaign-leverages-cve-2017-0199-flaw
https://securelist.com/vulnerability-exploit-report-q2-2024/113455/
https://thehackernews.com/2024/08/multi-stage-valleyrat-targets-chinese.html
https://www.securityweek.com/indian-apt-targeting-mediterranean-ports-and-maritime-facilities/
https://thehackernews.com/2024/06/china-linked-valleyrat-malware.html
https://securelist.com/vulnerability-report-q1-2024/112554/
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a
https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-133a
https://www.mandiant.com/resources/blog/cve-2017-0199-hta-handler
https://us-cert.cisa.gov/ncas/alerts/aa21-200a
https://www.cisa.gov/news-events/cybersecurity-advisories/aa19-339a
https://www.welivesecurity.com/2020/05/13/ramsay-cyberespionage-toolkit-airgapped-networks/
https://www.programmersought.com/article/62493896999/
https://www.mandiant.com/sites/default/files/2022-02/rt-apt41-dual-operation.pdf
https://www.accenture.com/us-en/blogs/cyber-defense/mudcarps-focus-on-submarine-technologies
https://blog.talosintelligence.com/2018/07/multiple-cobalt-personality-disorder.html
https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-june-mustang-panda/
https://www.volexity.com/blog/2018/06/07/patchwork-apt-group-targets-us-think-tanks/
https://crowdstrike.lookbookhq.com/global-threat-report-2018-web/cs-2018-global-threat-report
https://services.google.com/fh/files/misc/apt37-reaper-the-overlooked-north-korean-actor.pdf
https://blog.talosintelligence.com/2018/01/korea-in-crosshairs.html
https://documents.trendmicro.com/assets/tech-brief-untangling-the-patchwork-cyberespionage-group.pdf
https://web.archive.org/web/20190508170630/https://www.riskiq.com/blog/labs/cobalt-strike/
https://www.ptsecurity.com/upload/corporate/ww-en/analytics/Cobalt-2017-eng.pdf
https://www.proofpoint.com/us/threat-insight/post/apt-targets-financial-analysts
https://www.ptsecurity.com/upload/corporate/ww-en/analytics/Cobalt-Snatch-eng.pdf
https://securelist.com/the-dropping-elephant-actor/75328/
https://www.mdsec.co.uk/2017/04/exploiting-cve-2017-0199-hta-handler-vulnerability/
https://www.fireeye.com/blog/threat-research/2017/04/cve-2017-0199_useda.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0199
https://blog.nviso.be/2017/04/12/analysis-of-a-cve-2017-0199-malicious-rtf-document/
http://www.securitytracker.com/id/1038224
http://www.securityfocus.com/bid/97498
http://rewtin.blogspot.nl/2017/04/cve-2017-0199-practical-exploitation-poc.html