Microsoft Word users should be extra careful about the files they download because hackers are exploiting an unpatched vulnerability in the popular word-processing software.On Thursday, security vendor McAfee warned users of a new Trojan program, called BackDoor-CKB!cfaae1e6, that secretly installs software on a computer. For the Trojan to work, however, hackers must first trick users into opening a malicious Word document. Once that has been done, though, the results can be nasty.Unlike viruses and worms,Trojan programs do not make copies of themselves that keep spreading throughout the Internet. Hackers directly distribute the programs, which are often disguised as useful or interesting downloads.Once installed, the malware lets hackers “execute any external commands, download additional Trojans, capture desktop screen shots, monitor and record keystrokes or passwords,” McAfee said in a statement on its website. Symantec has confirmed that hackers are circulating the malware via malicious Word document e-mail attachments. But at present, its use is “limited to attacks against select targets,” Symantec said in a note on its DeepSight threat analysis service.The attack originated in Asia and targets “specific large organizations,” Symantec said, adding that it has seen similar targeted attacks in the past that also took advantage of flaws in Microsoft Office applications. The attackers behind the Trojan may be operating from China or Taiwan, according to Johannes Ullrich, chief technical officer of the SANS Internet Storm Center. Servers associated with the attack have been traced back to those countries, and researchers have found Chinese characters in the malicious Word document, Ullrich said.One company—an unnamed government contractor that reported details of its attack to SANS—said the malicious e-mail had been sent to only one person in its organization, and had been written to resemble a normal inter-office message, Ullrich said.“The exploit was quite sophisticated,” he said. “None of the antivirus systems that they used caught it.”Ullrich said he did not know what the attackers’ ultimate goal may be, but they can snoop on data or install unauthorized software once the Trojan gets installed. “It opened up a remote connection to a website in China that would have allowed it to remotely control [the infected computer],” he said.SANS has published a number of tips on how to avoid this type of attack. The security training organization recommends that companies limit users’ privileges and monitor outbound traffic. It also suggests that companies think about quarantining all attachments for six to 12 hours in order to give the antivirus vendors time to catch up with new threats.Because users must download the malicious software in order to become infected, McAfee rates the risk of the Trojan as “low.” The vulnerability affects Microsoft Word XP and Word 2003, but does not work on computers that use the Word Viewer to view documents, according to Microsoft. Word Viewer is software that lets users read Word documents without installing the Word software.Microsoft is testing a fix for the Word vulnerability and expects to release this as part of its next round of monthly security patches, which is scheduled to be released on June 13.— Robert McMillan, IDG News Service Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe