APT attackers using booby-trapped RTF docs

The Advanced Persistent Threat (APT) is a type of attack that has been in the news a lot lately, but exactly what techniques do APT attackers use to infect systems? Trend Micro researchers report that one of the most common is the use of “booby-trapped” rich text (RTF) documents created with Microsoft Office software (Word). Many of the malicious documents that target a vulnerability in the code for parsing RTF files include RTF content that’s embedded in a .doc file, so just because the file doesn’t have the .rtf extension, that doesn’t mean it’s safe from this exploit.

Read more here:


About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top