New Word attacks pose as news about Tibet
It's the usual drill, say security vendors, so be careful out there
Computerworld - New attacks using rigged Microsoft Word documents have been launched, a security company said today as it warned users to be leery of mail touting news about Tibet.
Phony e-mails purporting to contain news about Tibet and its government in exile are making the rounds, according to Trend Micro Inc., which explained that the messages carry attachments that are malformed Word documents designed to exploit a vulnerability in parsing the popular word processing system's file format.
When opened, the malicious documents deposit a Trojan horse on the victim's Windows PC, said Trend Micro in a post to its security blog.
Trend Micro said the names on the fake Word documents include the following:
- CHINA';S [sic] OLYMPIC TORCH OUT OF TIBET 1.doc
- 2007-07 DRAFT Tibetan MP London schedule.doc
- DIRECTORY OF TIBET SUPPORT GROUPS IN INDIA.doc
- Disapppeared [sic] in Tibet.doc
Another security firm, Symantec Corp., confirmed the new attacks but said that it has received only "a small number" of submissions from customers regarding the exploit.
"This social engineering technique has been seen before," said Trend Micro researcher Jake Soriano on the TrendLabs Malware blog. "In October, a Trojan rode on the newsworthiness of the monk-led protests in Myanmar ... arriving as an attachment to spam [that] purported to be a message of support from the Dalai Lama to the monks."
Symantec repeated the long-standing advice that users consider banning Office documents that originate from unknown senders and exercise caution in dealing with unsolicited e-mails, particularly those with attachments.
Microsoft Corp. has patched Word several times in the past two years -- most recently in May 2007, when it holes in the way the application handles documents. The company has also been promoting its newest suites, Office 2007 for Windows and Office 2008 for Mac, as being more secure on the file format front than their predecessors, and it has locked down Office 2003 by limiting the number of formats users can open.
Read more about Security in Computerworld's Security Topic Center.
- EndPoint Interactive eGuide In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!