Malware Alert: Vulnerability in Outlook Enables Hackers to Seize Control of Your Computer

In a world where cybermenaces are increasing and constantly evolving, each new security flaw represents a potential breach with devastating consequences. In January 2025, Microsoft revealed CVE-2025-21298, a critical vulnerability at the heart of Outlook, operated by hackers to execute malicious remote code. A threat all the more alarming since it requires no user interaction, transforming a simple email into a vector of silent attack.

A critical vulnerability identified under the name of CVE-2025-212988

Noted 9.8 out of 10 on the CVSS gravity scale according to Offsec, this vulnerability is based on a weakness of the Windows Object Linking and Embedding Protocol (OLE), used to integrate and link objects between applications. A simple preview of a trapped email is enough to trigger the execution of a remote malicious code, without additional user interaction.

The hackers exploit a dysfunction in the ol32.dll library, precisely in the utolepresstmtocontentsstm function. This fault makes it possible to inject code into an OLE flow and to run it directly on the target computer, thus opening a door to cybercriminals to access the data and manipulate the system remotely.

How hackers use this fault in Outlook

Vulnerability is particularly alarming due to its simplicity of exploitation. Pirates send emails containing malicious RTF files. When a user opens or flies up the email in the Outlook preview pane, the code is automatically executed. A “zero-click” method which makes the attack all the more formidable.

Outlook is diverted as a communication tool between hackers and malware thanks to this CVE-2025-21298 vulnerability. The finalized malware, for example, uses drafts of emails to receive instructions and send stolen data, thus escaping antivirus.

Elastic Security Labs reports that hackers place orders in drafts called “R_” and recover the answers in “p_” drafts, deleting each trace after use, as reported by 01net.

A major risk for users and companies

A successful exploitation of this fault exposes to many risks. Hackers can access files and modify data. They can also delete them or install malicious programs. Some even create new accounts with high privileges. The Elastic Security Labs report specifies that an South American Ministry of Foreign Affairs has already been targeted. This attack demonstrates the severity of the threat.

Companies are particularly vulnerable because intrusion can lead to a massive flight of data, industrial spying or attacks by ransomware. According to Microsoft, relayed by Notebookcheck, all recent versions of Windows, including Windows 10, 11 and Server, are concerned.

What are the solutions to protect yourself?

Faced with this threat, Microsoft quickly deployed a correction via the January 2025 updates. The installation of this patch is essential to secure systems and block the exploitation of CVE-2025-21298.

In the meantime or in addition to the update, several measures can limit the risks:

  • Show crude text emails to prevent the execution of potentially dangerous content
  • Disable the preview pane in Outlook
  • Restress or deactivate the NTLM protocol on internal networks
  • Systematically check the origin of emails and attachments before opening them

Experts also recommend the use of detection rules such as SIGMA to identify suspicious interactions with RTF files, often used in this type of attack.

The CVE-2025-21298 affair recalls the importance of maintaining your software up to date and adopting rigorous cybersecurity practices. While hackers perfect their techniques, users must redouble their vigilance to protect their data and systems.

More news

Berlin’s Unsold Christmas Trees Repurposed to Nourish Zoo Elephants

Even after the holidays, the Christmas spirit continues to be felt at Berlin Zoo. To the delight of the park animals, it was time ...

Concerned About Authoritarian Trends, Researchers Are Leaving OpenAI in Droves

When technologies advance at full speed, transparency becomes just as essential as innovation. In the field of artificial intelligence, it is sometimes the researchers ...

Resurrected from the Depths: The French Submarine Le Tonnant, Lost in 1942, Unearths a Forgotten Chapter of WWII off Spain’s Coast

For more than eight decades, Le Tonnant existed only in military reports and family memories. Scuttled in the chaos of the Second World War, ...

Leave a Comment