Question!
Should I disable it even though I do not have any Microsoft office/products installed? Also, on my desktop which was primarily used for academic purposes, I have tons of word documents created in MS word, am I already compromised?
Thanks for sharing by the way!
Not really if you haven't downloaded any of the malicious file from internet that could give them access to your files but for safety reasons if you have sensative information on those documents then uninstall it as the hackers are bypassing the security protocols through this vulnerability and have full access of your system environment which could be risky.
As stated in the OP, this vulnerability is not just about stealing Bitcoin but about any digital information you store on your computer - and it is known that private keys and seed should not be stored on a computer, especially not in unprotected form as plain text. At risk here are those who do not have high security standards and are negligent in most things they do - but since it is very easy to disable this attack, I see no reason why we should not prevent something bad from happening.
Which is why it's said to backup them on offline storage like metal plates and steel washers are the best option as if anything is comprised your wallets seeds are not hacked and your funds are safe on non-custodial or hardware wallets but you must be extra cautious with them also as there have been security breaches and phising attempts in them also.
Those are the ones I’ve seen explicitly referenced so far.
Yeah according to the article thes file extensions are exploiting at the time with this vulnerability but without opening the document also is much risky as you could download these malicious files by mistake but keep an eye before clicking on any link or downloading the files on system.
It seems that the password requirement for the MSDT
can be bypassed by exploiting a given vulnerability.
They already have buffer in order to have the remote access of any system to make changes of which the hackers are taking advantage and without any password they are having the access of the system.These are the things they need to have look upon and need to have some security breaches be possible with having one access control point with them always.