APT attackers using booby-trapped RTF docs

The Advanced Persistent Threat (APT) is a type of attack that has been in the news a lot lately, but exactly what techniques do APT attackers use to infect systems? Trend Micro researchers report that one of the most common is the use of “booby-trapped” rich text (RTF) documents created with Microsoft Office software (Word). Many of the malicious documents that target a vulnerability in the code for parsing RTF files include RTF content that’s embedded in a .doc file, so just because the file doesn’t have the .rtf extension, that doesn’t mean it’s safe from this exploit.

Read more here:

http://m.cio.com/article/706123/APT_Attackers_Are_Increasingly_Using_Booby_trapped_RTF_Documents_Experts_Say

Leave a Comment

Your email address will not be published.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top