WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships U.S. Cyber Command Issues Alert about Hackers Exploiting Outlook Vulnerability
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

U.S. Cyber Command Issues Alert about Hackers Exploiting Outlook Vulnerability

Author: Charles Egli

Created: Tuesday, July 9, 2019 - 18:35

Categories: Cybersecurity

Last week, U.S. Cyber Command issued an alert via Twitter about threat actors abusing an Outlook vulnerability to plant malware on government networks. The vulnerability is CVE-2017-11774, a security bug that Microsoft patched in Outlook in October 2017. U.S. Cyber Command recommends immediate patching, if not done already. The bug allows a threat actor to escape from the Outlook sandbox and run malicious code on the underlying operating system. By 2018, it had been weaponized by an Iranian state-sponsored hacking group primarily known for developing the Shamoon disk-wiping malware. The malware samples shared by U.S. Cyber Command link the new attacks the agency is seeing to old malware samples – most likely deployed in new attacks against U.S. entities. This alert comes on the heels of an advisory issued by the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency in late-June (WaterISAC reported on the advisory both in an email to members and in the June 25 Security and Resilience Update). That advisory warned about increased activity from Iranian threat actors, and especially about the usage of disk-wiping malware such as Shamoon. Read the article at ZDNet.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar