One day after patching a widely exploited flaw in its Internet Explorer browser, Microsoft has a new bug to worry about, this time in PowerPoint.Attackers have been exploiting a newly discovered bug in Microsoft’s Office presentation software in extremely targeted attacks, McAfee reported Wednesday.Researchers were made aware of the attacks when a customer submitted two different malicious PowerPoint files, which exploited the same vulnerability, said Craig Schmugar, a virus researcher at McAfee. Both files installed malicious remote access Trojan software that then attempted to connect to an outside Web server, he said.Though McAfee is not releasing technical details of the exploit, the security vendor says it has confirmed that the attack works on three versions of Office running on the Windows 2000 operating system: Office 2000, Office XP, and Office 2003. Other platforms and other Office applications may also be affected, but McAfee has not yet had time to complete its testing, Schmugar said. Schmugar has blogged about the issue here.Microsoft issued a security advisory on the matter Wednesday, saying that the issue affects users of Microsoft Office 2000, Office 2003 and Office XP, as well as PowerPoint 2004 for Mac. Microsoft’s advisory can be found here. As a workaround, Microsoft suggests that users open and view files using PowerPoint Viewer 2003. This software “does not contain the vulnerable code and is not susceptible to this attack,” the advisory states. The PowerPoint viewer can be downloaded here.Microsoft “has concluded that this issue affects users of Microsoft Office 2000, Microsoft Office 2003, and Microsoft Office XP,” the company said in a statement.Microsoft and other security vendors, including Symantec and McAfee, have added signatures to their security products so that they can detect this malicious code.Over the past few months, attackers have focused on Office, exploiting a number of undisclosed Office bugs in extremely targeted attacks, often on government agencies or contractors. These attacks usually take the form of an e-mail that has a malicious Office document attached and is sent to a small number of target victims.This latest PowerPoint attack fits that pattern and was sent to a defense contractor, Schmugar said. He declined to provide further details on the intended victim.Because the attack has been extremely limited in scope, it is considered to be a low risk for most users, Schmugar said. News of the attack comes the day after Microsoft issued an emergency patch for a widely exploited bug that affected the vector markup language rendering engine used by Internet Explorer and Outlook. Hackers are exploiting this critical flaw in the browser via mass e-mail and on thousands of websites, security experts said.Microsoft’s next set of security patches will be released Oct. 10. The software vendor did not say whether it plans to patch this latest PowerPoint flaw.By Robert McMillan, IDG News Service (San Francisco Bureau)Keep checking in at our Security Feed for updated news coverage. Related content news UK Cyber Security Council CEO reflects on a year of progress Professor Simon Hepburn sits down with broadcaster ITN to discuss Council’s work around cybersecurity professional standards, careers and learning, and outreach and diversity. By Michael Hill Sep 27, 2023 3 mins Government Government Government news FIDO Alliance certifies security of edge nodes, IoT devices Certification demonstrates that products are at low risk of cyberthreats and will interoperate securely. By Michael Hill Sep 27, 2023 3 mins Certifications Internet Security Security Hardware news analysis Web app, API attacks surge as cybercriminals target financial services The financial services sector has also experienced an increase in Layer 3 and Layer 4 DDoS attacks. By Michael Hill Sep 27, 2023 6 mins Financial Services Industry Cyberattacks Application Security news Immersive Labs adds custom 'workforce exercising' for each organizational role With the new workforce exercising capability, CISOs will be able to see each role’s cybersecurity readiness, risk areas, and exercise progress. By Shweta Sharma Sep 27, 2023 3 mins Security Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe