Trojan appears that leverages patched Microsoft Office flaw

Researchers at Symantec said they have spotted a trojan taking advantage of a previously patched Microsoft Office vulnerability.

The exploit, which is being used in targeted attacks, arrives as an email that contains a Microsoft Word file and a separate DLL file, a rare combination considering DLL files are not typically sent over email.

"The exploit makes use of an ActiveX control embedded in the Word document file," senior researcher Joji Hamada wrote Thursday in a blog post. "When the Word document is opened, the ActiveX control calls fputlsat.dll, which has the identical file name as the legitimate DLL file used for the Microsoft Office FrontPage Client Utility LIbrary. If the exploit is successful, malware is dropped onto the system."

The trojan, dubbed "Activehijack" by Symantec, takes advantage of a vulnerability rated "important" that was patched by Microsoft in September with bulletin MS11-073.

To avoid the exploit, users should ensure they have installed the patch and remain wary of emails that contain DLL files, Hamada said.

More in News

Privacy-bolstering "Apps Act" introduced in House

The bill would provide consumers nationwide with similar protections already enforced by a California law.

Microsoft readies permanent fix for Internet Explorer bug used in energy attacks

Microsoft is prepping a whopper of a security update that will close 33 vulnerabilities, likely including an Internet Explorer (IE) flaw that has been used in targeted website attacks against the U.S. government.

Weakness in Adobe ColdFusion allowed court hackers access to 160K SSNs

Up to 160,000 Social Security numbers and one million driver's license numbers may have been accessed by intruders.