![microsoft word equation editor not active microsoft word equation editor not active](https://2.bp.blogspot.com/-3Bdj6VXqENU/WkjK-Pne_YI/AAAAAAAAALM/513lrEdfhh0EIPpaZDqwPSsNU64gm3v5QCLcBGAs/s1600/e.jpg)
The variant analyzed had altered its encoded payload from the known “8.t” file to a new filename: “e.o”. The RoyalRoad weaponizer is also known as the 8.t Dropper/RTF exploit builder.
#Microsoft word equation editor not active update
Microsoft’s Equation Editor was included in earlier versions of Word but was removed from all versions in the January 2018 Public Update because of security issues with its implementation. The r esearch team defined RoyalRoad as a tool that generates weaponized RTF documents that exploit vulnerabilities in Microsoft’s Equation Editor including CVE-2017-11882, CVE-2018-0798 and CVE-2018-0802. Petersburg, a national research center that designs underwater weapons. The email used to deliver the initial infection vector was addressed to the “respectful general director Igor Vladimirovich” at the Rubin Design Bureau, a submarine design center from the “Gidropribor” concern in St. In this instance, the target of the spear-phishing attack was a general director working at the Rubin Design Bureau, a Russia-based defense contractor that designs nuclear submarines for the Russian Federation’s Navy. Spear-phishing attack targets Russian defense contractor
![microsoft word equation editor not active microsoft word equation editor not active](https://authorservices.wiley.com/asset/photos/book-author.html/Mathtype2.jpg)
The researchers have been tracking recent developments in the RoyalRoad when they uncovered an attack targeting a Russian-based defense contractor. Researchers from Cybereason Nocturnus Team have detected anomalous characteristics in a newly discovered RoyalRoad weaponizer that delivers a previously undocumented backdoor.