Attackers have found another hole in Microsoft’s Office products. On Thursday, Symantec reported that it has discovered a targeted attack that takes advantage of an unpatched vulnerability in Microsoft’s PowerPoint software.The hackers behind this attack are using the same techniques that were used in previously reported Word and Excel attacks, said Dave Cole, a director with Symatnec Security Response. “It’s similar to the pattern we’ve seen over he past few months where they’re using a previously unknown Microsoft vulnerability, and an e-mail enticement to get a back door on someone’s machine.”Cole believes that the same hackers may be behind all three attacks. “It looks like it may be the same group just based on the similarity of attacks,” he said.As with the Word and Excel attacks, this latest malware is not widespread. This PowerPoint attack was discovered late Wednesday by a Symantec customer, who received a Chinese-character e-mail from a Gmail account. The e-mail contained a PowerPoint attachment that installed two pieces of malicious code when opened: a Trojan horse program, called Trojan.PPDDropper.B, and a backdoor program called Backdoor.Bifrose.E.The backdoor program tries to cover its tracks by writing over the original PowerPoint document. It then awaits instructions from the attackers, who can use it to control the infected system. Office is fast becoming the target of choice for hackers.Microsoft patched a total of 12 Office vulnerabilities on Tuesday, but the PowerPoint bug used by this latest malware was not one of them, according to Cole.Microsoft is investigating the vulnerability, said Stephen Toulouse, a security program manager with Microsoft’s security response center.Symantec is studying it as well. The security vendor said it does not yet know if the attack is specific to PowerPoint, or whether it affects all Office products.-Robert McMillan, IDG News Service (San Francisco Bureau)Keep checking in at our CSO Security Feed page for updated news coverage. Related content feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security news US cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacks Cyber insurance claims frequency increased by 12% in the first half of 2023 while claims severity increased by 42% with an average loss amount of more than $115,000. By Michael Hill Sep 20, 2023 3 mins Insurance Industry Risk Management news Intel Trust Authority attestation services now in general availability Formerly known as Project Amber, Intel’s attestation services support confidential computing deployments. By Michael Nadeau Sep 20, 2023 3 mins Zero Trust Security Hardware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe