People still fall for this :-(
Infosec biz F-Secure has uncovered a North Korean phishing campaign that targeted a sysadmin with a fake Linkedin job advert using a General Data Protection Regulation (GDPR) themed lure. The sysadmin worked for a cryptocurrency business, said the threat intel firm, which made him a ripe target for the money-hungry state …
You have to be a boob to go and enable content just to read a Word document. Whatever is enabled is just links and code, the actual content of the document does not need enabling to read it. On top of that, whatever links may be embedded generally pertain to the author's network, and you haven't a snowball's chance in Hell of being able to access it. So the only thing you'd be enabling is code you don't know.
And this was a sysadmin <facepalm>.
Not sure what the "facepalm" is about.
The behavior of the targeted sysadmin? I see no mention in the article that (s)he actually fell for the trap.
The fact that they (the authors, apparently APT38) sent out such badly disguised attacks? Normal procdure. Send that to 1000 people (whether IT security "professionals" or not), and you will definitely get a non-zero number of people falling for it.
Biting the hand that feeds IT © 1998–2021