Microsoft Word for Mac exploit used in targeted attacks

Posted by   Virus Bulletin on   Mar 28, 2012

Tibetan NGOs targeted.

Researchers at Alienvault have discovered a targeted attack against Tibetan NGOs that uses a three-year-old vulnerability in Microsoft Office for Mac.

The attack exploits vulnerability MS09-027, which was discovered and subsequently patched by Microsoft in 2009. On unpatched systems, a specially crafted malicious document allows for remote code execution, giving the attacker full access to the victim's system.

The malware drops two trojans, one of which - 'MacControl' - was hitherto unknown and listens for commands from a command and control server.

The attack is not the first of its kind targeting Tibetan organisations and many believe the attackers are based in or have links with China. Indeed, the MacControl command and control server is hosted on a Chinese IP address.

Alienvault has more details on the attack here. Trend Micro recently wrote about a similar attack here.

Is your organisation vulnerable to targeted attacks? How seriously do you take the security of your Macs? Symantec.cloud's Martin Lee will discuss patterns and trends in targeted attacks at the VB seminar, while Sophos's Paul Baccas will talk about Mac security.

The VB seminar takes place 19 April 2012 at the OU Campus in Milton Keynes, UK.

Posted on 28 March 2012 by Virus Bulletin

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Throwback Thursday: Giving the EICAR test file some teeth

The 68-byte EICAR test file plays as important a role today as it did 19 years ago. In this week's Throwback Thursday we look back at a VB99 conference paper in which Randy Abrams described how this 'miracle tool' worked and how it could be used.

XMRig used in new macOS cryptominer

A new piece of cryptocurrency-mining malware on macOS has been found to use the popular XMRig miner.

Tendency for DDoS attacks to become less volumetric fits in a wider trend

CDN provider Cloudflare reports an increase in DDoS attacks targeting layer 7 and focusing on exhausting server resources rather than sending large volumes of data. This fits in a wider trend.

Turkish Twitter users targeted with mobile FinFisher spyware

Through fake social media accounts, users were tricked into installing an Android application that was actually a mobile version of the FinFisher spyware.

Hide'n'Seek IoT botnet adds persistence

The Hide'n'Seek IoT botnet has received an update to make its infection persist on infected devices beyond a restart.