Microsoft Officer RTF parsing vulnerabilities are a common target for attackers who distribute advanced persistent threats Booby-trapped RTF documents are one of the most common types of malicious Microsoft Office files that are used to infect computers with advanced persistent threats (APTs), according to security researchers from Trend Micro.“Taking data from exploit documents gathered last April, we can see that the most exploited MS Office software is MS Word,” said Trend Micro senior threat researcher Ryan Flores, in a blog post on Wednesday.The company’s statistics show that 63 percent of the malicious Microsoft Office documents intercepted in April exploited vulnerabilities in Microsoft Word.Out of those vulnerabilities, the most commonly targeted ones were CVE-2010-3333 and CVE-2012-0158, which stem from bugs in Microsoft Word’s code for parsing Rich Text Format content. RTF content can either be saved in a document with an .rtf extension, or can be embedded into a .doc file. In fact, many malicious documents that exploited CVE-2010-3333 and CVE-2012-0158 have had a .doc extension.The fact that the 2-year-old CVE-2010-3333 vulnerability is still widely exploited in attacks today shows that companies from many industries are failing to keep their Microsoft Office installations up to date, Flores said. This is particularly troubling because Microsoft just patched a new Microsoft Word RTF parsing vulnerability Tuesday that could allow remote code execution.The vulnerability is identified as CVE-2012-0183 and affects Microsoft Office 2003 and 2007 for Windows, as well as Microsoft Office 2008 and 2011 for Mac OS.Considering the attackers’ rapid adoption of exploits for CVE-2012-0158, a RTF parsing vulnerability patched by Microsoft in April, it’s likely that CVE-2012-0183 will also be targeted soon.“Within a span of two weeks, CVE-2012-0158 went from zero to actually surpassing CVE-2010-3333 as the preferred exploit of attackers,” Flores said. “This just shows that the time window for patching critical vulnerabilities is small, which requires due diligence and discipline on patch management by organizations.”APT attacks that use boobytrapped documents don’t only target Windows users. Back in March, researchers from security firm AlienVault, analyzed an APT attack against Tibetan activists that exploited a vulnerability in Microsoft Office for Mac to install Mac malware.“With the current interest being shown by cybercriminals in infecting Macs, it would be extremely sensible for all users of Microsoft Office on the Mac to update their systems as a matter of priority,” said Graham Cluley, a senior technology consultant at antivirus vendor Sophos, in a blog post on Wednesday. “Note that if you rely solely upon the Software Update feature built into Mac OS X it will not update the Microsoft product,” Cluley said. Security patches for Microsoft Office for Mac are delivered through the program’s own updating mechanism. Related content opinion Website spoofing: risks, threats, and mitigation strategies for CIOs In this article, we take a look at how CIOs can tackle website spoofing attacks and the best ways to prevent them. By Yash Mehta Dec 01, 2023 5 mins CIO Cyberattacks Security brandpost Sponsored by Catchpoint Systems Inc. Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring) Today’s IT systems have more points of failure than ever before. Internet Performance Monitoring provides visibility over external networks and services to mitigate outages. By Neal Weinberg Dec 01, 2023 3 mins IT Operations brandpost Sponsored by Zscaler How customers can save money during periods of economic uncertainty Now is the time to overcome the challenges of perimeter-based architectures and reduce costs with zero trust. By Zscaler Dec 01, 2023 4 mins Security feature LexisNexis rises to the generative AI challenge With generative AI, the legal information services giant faces its most formidable disruptor yet. That’s why CTO Jeff Reihl is embracing and enhancing the technology swiftly to keep in front of the competition. By Paula Rooney Dec 01, 2023 6 mins Generative AI Digital Transformation Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe