that the latest Microsoft Office zero-day vulnerability is linked to the Godzilla botnet loader discussed in our recent blog . During our research , we observedVulnerability-related.DiscoverVulnerabilitythe IPs related to the Godzilla Botnet loader serving payloads associated with exploits for the latest zero-day vulnerability in Microsoft Office . Microsoft has saidVulnerability-related.DiscoverVulnerabilitythat the vulnerability will be patchedVulnerability-related.PatchVulnerabilitytoday . Netskope Threat Protection detectsVulnerability-related.DiscoverVulnerabilitythe known exploits for this new vulnerability as Backdoor.Explot.ANWK . The payload for the exploit are detectedVulnerability-related.DiscoverVulnerabilityas Backdoor.Generckd.4818242 and Backdoor.Generckd.4818381 . This vulnerability allows a malicious actor to execute a Visual Basic script , when the victim opens a document containing an embedded exploit . An excerpt of the VBScript code embedded in the document is shown in Figure 1 . Figure 1 : VBScript code in the malicious document We observedVulnerability-related.DiscoverVulnerabilitythe domains btt5sxcx90.com , hyoeyeep.ws and rottastics36w.net also serving payloads associated with the latest Microsoft Office zero-day exploit . At this moment we can not speculate that the spam campaign and zero-day are related . However , based on current observations , we believe that the same attack group is behind these attacks . Netskope recommends users to block all the IPs and domains mentioned in Figure 8 of our previous blog . Additionally , we suggest users ensure that Office Protected View is enabled to prevent exposure to this attack .