Exploits involved booby-trapped Rich Text Format file and Microsoft Outlook email Exploits aimed at the recently discovered zero-day vulnerability in Microsoft Word are similar to those used last year by hackers suspected of gathering intelligence for nation states or private companies, a researcher says.[IE zero-day flaw shows kinks in Microsoft patching]Microsoft disclosed the vulnerability Monday in a security bulletin that said the flaw was being exploited in “limited, targeted attacks” directed at Word 2010. The same vulnerability is also in Word 2003, 2007, 2013 and 2013 RT. The latter is the operating system for Windows tablets running on ARM processors.The exploits included a booby-trapped Rich Text Format (RTF) file and a specially crafted mail in Microsoft Outlook. Both exploits targeted the previously unknown vulnerability when Word is used as the email viewer.The RTF exploit is similar to those used in zero-day attacks last year against Microsoft Office, security vendor Sophos told CSOonline Tuesday. The older exploits were also used in targeted attacks, known in the industry as an advanced persistent threat (APT). “All of them (exploits) were discovered in almost an identical manner — used in a single attack against a single organization in the wild when they were zero-days,” Chester Wisniewski, senior security adviser for Sophos, said. “So when I heard about this thing (latest exploit), immediately I’m like, ‘Oh, it’s probably the same guys.'”Over the last half dozen years or so, every RTF exploit targeting a zero-day vulnerability was being used to steal information from a particular target, Wisniewski said. APT attacks are typically launched against companies in a specific industry, such as defense or financial services. The hackers are usually paid to conduct national or industrial espionage.While there’s no immediate danger for most companies from the latest threat, similar exploits will eventually be used by mainstream hackers focused on compromising PCs to steal online banking credentials, credit card numbers and other personal data.Last year’s RTF exploits were found in money-stealing malware families, most notably Zbot, three months after the exploits were discovered in APT attacks. Zbot is used primarily to steal online banking credentials, including usernames, passwords and one-time access codes used in two-factor authentication.With the latest exploit, none of Sophos’ corporate customers have reported finding it in their systems.“At this point, the garden variety bad guys have not figured it out yet, which is good news,” Wisniewski said. “They will figure it out, but at this point, 24 hours in, we’ve had zero hits in our telemetry.”Office is a focus of many APT attacks because large companies are generally slower to patch the productivity suite than the Windows operating system, Wisniewski said. That’s because patching Office in thousands of computers can be a major undertaking. [Microsoft offers quick fix for zero-day vulnerability]“If you were a company with 25,000 PCs in defense, I don’t know that you can roll out a fix fast enough,” Wisniewski said. “You’re still going to be vulnerable for a while.” Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe