New Word attacks pose as news about Tibet
It's the usual drill, say security vendors, so be careful out there
Computerworld - New attacks using rigged Microsoft Word documents have been launched, a security company said today as it warned users to be leery of mail touting news about Tibet.
Phony e-mails purporting to contain news about Tibet and its government in exile are making the rounds, according to Trend Micro Inc., which explained that the messages carry attachments that are malformed Word documents designed to exploit a vulnerability in parsing the popular word processing system's file format.
When opened, the malicious documents deposit a Trojan horse on the victim's Windows PC, said Trend Micro in a post to its security blog.
Trend Micro said the names on the fake Word documents include the following:
- CHINA';S [sic] OLYMPIC TORCH OUT OF TIBET 1.doc
- 2007-07 DRAFT Tibetan MP London schedule.doc
- DIRECTORY OF TIBET SUPPORT GROUPS IN INDIA.doc
- Disapppeared [sic] in Tibet.doc
Another security firm, Symantec Corp., confirmed the new attacks but said that it has received only "a small number" of submissions from customers regarding the exploit.
"This social engineering technique has been seen before," said Trend Micro researcher Jake Soriano on the TrendLabs Malware blog. "In October, a Trojan rode on the newsworthiness of the monk-led protests in Myanmar ... arriving as an attachment to spam [that] purported to be a message of support from the Dalai Lama to the monks."
Symantec repeated the long-standing advice that users consider banning Office documents that originate from unknown senders and exercise caution in dealing with unsolicited e-mails, particularly those with attachments.
Microsoft Corp. has patched Word several times in the past two years -- most recently in May 2007, when it holes in the way the application handles documents. The company has also been promoting its newest suites, Office 2007 for Windows and Office 2008 for Mac, as being more secure on the file format front than their predecessors, and it has locked down Office 2003 by limiting the number of formats users can open.
Read more about Security in Computerworld's Security Topic Center.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!