{"id":207,"date":"2006-05-23T03:59:13","date_gmt":"2006-05-23T03:59:13","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2006\/05\/trojan-for-the-word-vulnerability-in-the-wild\/"},"modified":"2015-09-09T19:43:56","modified_gmt":"2015-09-09T11:43:56","slug":"trojan-for-the-word-vulnerability-in-the-wild","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2006\/05\/trojan-for-the-word-vulnerability-in-the-wild\/","title":{"rendered":"Trojan for the Word Vulnerability in the Wild"},"content":{"rendered":"

[ad]<\/p>\n

We all knew it was just a matter of time until the ‘thing’ was out. <\/p>\n

PandaLabs has detected the appearance of 1Table.A, a malicious code that exploits a recently detected critical vulnerability in Microsoft Word, and which also affects versions of MS Office 2003 and XP.<\/p><\/blockquote>\n

Microsoft confirmed<\/a> today the existence of this vulnerability and apparently is working<\/a> on a hotfix. <\/p>\n

This security problem allows the execution of code on affected systems and, more dangerously, allows the construction of malicious code which is indistinguishable at first glance from a normal Word file.<\/p><\/blockquote>\n

That’s more than enough to get 70%* of the people who use Microsoft Office to download and execute the file. If they open .BAT, .COM and .EXE, opening a .DOC is everyday work.<\/p>\n

This attack is not limited to .DOC files, still, they will be the most used extension. It can take place with a .XLS file with an embedded Word document.<\/p>\n

1Table.A – the new trojan – is detected by most of the antivirus software, however, user’s should have they’r eyes open until patch is released by Microsoft (even if they don’t consider it critical<\/a>)<\/em><\/p>\n

Source:<\/strong> NHS<\/a><\/p>\n

* 80% of the statistics are made on the spot!<\/em><\/p>\n

<\/p>\n

Digg This Article<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

[ad] We all knew it was just a matter of time until the ‘thing’ was out. PandaLabs has detected the appearance of 1Table.A, a malicious code that exploits a recently detected critical vulnerability in Microsoft Word, and which also affects versions of MS Office 2003 and XP. Microsoft confirmed today the existence of this vulnerability […]<\/p>\n","protected":false},"author":20,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[10,7,4],"tags":[37,353,295,767,595,8857],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Tiago Faria","author_link":"https:\/\/www.darknet.org.uk\/author\/gouki\/"},"_links":{"self":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts\/207"}],"collection":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":0,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts\/207\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/media?parent=207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/categories?post=207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/tags?post=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}