APT attackers are increasingly using booby-trapped RTF documents, experts say

Microsoft Officer RTF parsing vulnerabilities are a common target for attackers who distribute advanced persistent threats

Booby-trapped RTF documents are one of the most common types of malicious Microsoft Office files that are used to infect computers with advanced persistent threats (APTs), according to security researchers from Trend Micro.

"Taking data from exploit documents gathered last April, we can see that the most exploited MS Office software is MS Word," said Trend Micro senior threat researcher Ryan Flores, in a blog post on Wednesday.

The company's statistics show that 63 percent of the malicious Microsoft Office documents intercepted in April exploited vulnerabilities in Microsoft Word.

Out of those vulnerabilities, the most commonly targeted ones were CVE-2010-3333 and CVE-2012-0158, which stem from bugs in Microsoft Word's code for parsing Rich Text Format content.

RTF content can either be saved in a document with an .rtf extension, or can be embedded into a .doc file. In fact, many malicious documents that exploited CVE-2010-3333 and CVE-2012-0158 have had a .doc extension.

The fact that the 2-year-old CVE-2010-3333 vulnerability is still widely exploited in attacks today shows that companies from many industries are failing to keep their Microsoft Office installations up to date, Flores said.

This is particularly troubling because Microsoft just patched a new Microsoft Word RTF parsing vulnerability Tuesday that could allow remote code execution.

The vulnerability is identified as CVE-2012-0183 and affects Microsoft Office 2003 and 2007 for Windows, as well as Microsoft Office 2008 and 2011 for Mac OS.

Considering the attackers' rapid adoption of exploits for CVE-2012-0158, a RTF parsing vulnerability patched by Microsoft in April, it's likely that CVE-2012-0183 will also be targeted soon.

"Within a span of two weeks, CVE-2012-0158 went from zero to actually surpassing CVE-2010-3333 as the preferred exploit of attackers," Flores said. "This just shows that the time window for patching critical vulnerabilities is small, which requires due diligence and discipline on patch management by organizations."

APT attacks that use boobytrapped documents don't only target Windows users. Back in March, researchers from security firm AlienVault, analyzed an APT attack against Tibetan activists that exploited a vulnerability in Microsoft Office for Mac to install Mac malware.

"With the current interest being shown by cybercriminals in infecting Macs, it would be extremely sensible for all users of Microsoft Office on the Mac to update their systems as a matter of priority," said Graham Cluley, a senior technology consultant at antivirus vendor Sophos, in a blog post on Wednesday.

"Note that if you rely solely upon the Software Update feature built into Mac OS X it will not update the Microsoft product," Cluley said. Security patches for Microsoft Office for Mac are delivered through the program's own updating mechanism.

CHANNEL CHOICE: Vote Now for your favourite in the three categories: Vendor, Distributor and Reseller. Voting closes August 8.

More about APTMacsMicrosoftSophosTrend Micro

ARN Directory | Distributors relevant to this article

ARN Directory | Vendors relevant to this article

Comments

Comments are now closed

 

Latest News

05:28PM
Channel’s Software-Defined Everything competency will be specialised: Schneider ...
04:33PM
Communications Alliance urges caution in online copyright debate
04:13PM
The “always-on” business needs quick recovery: Veeam
03:44PM
Atmail Cloud billings jump 900 per cent on Zuora SaaS platform
More News
05 Aug
Systems Technology Day - Build Your Own Private Cloud
06 Aug
Oracle Employee Experience Journey Mapping Workshops
20 Aug
Westcon Group Imagine 2014 - Melbourne
21 Aug
CAST 611 Advanced Penetration Testing
View all events