APT attackers using booby-trapped RTF docs
The Advanced Persistent Threat (APT) is a type of attack that has been in the news a lot lately, but exactly what techniques do APT attackers use to infect systems? Trend Micro researchers report that one of the most common is the use of "booby-trapped" rich text (RTF) documents created with Microsoft Office software (Word). Many of the malicious documents that target a vulnerability in the code for parsing RTF files include RTF content that's embedded in a .doc file, so just because the file doesn't have the .rtf extension, that doesn't mean it's safe from this exploit.
Read more here: