New trojan detected for Microsoft Word

May 22, 2006

A new Trojan virus has been detected that uses a Microsoft Word vulnerability to infect computers, Panda Software Labs reported.

According to the malware software/research firm, the virus called 1Table.A, releases the Gusi Trojan on the system, allowing infected computers to be controlled remotely.

The vulnerability of the Word program allows "the execution of code on affected systems and, more dangerously, allows the construction of malicious code which is indistinguishable at first glance from a normal Word file," Panda Software Labs said.

It also affects versions of MS Office 2003 and XP, and so far, no patch has been released by Microsoft that addresses the vulnerability.

While, the virus can not send itself automatically, the firm said, it can still be done if a malicious user were to intervene. And still, the virus can be sent as attachments to e-mail messages or downloaded from web pages or P2P file-sharing networks.

"This is a very serious security problem, as it allows malicious Word documents to be created which could take a host of actions on computers," Panda Labs' director Luis Corrons said. "Cyber-crooks have seen the enormous potential of this vulnerability, and it has only taken a few hours until we have seen the first malicious code that exploits it, and no doubt there will be more shortly."

Copyright 2006 by United Press International

Explore further: Detecting and blocking leaky Android apps

Related Stories

Viruses: You've heard the bad—here's the good

Apr 30, 2015

"The word, virus, connotes morbidity and mortality, but that bad reputation is not universally deserved," said Marilyn Roossinck, PhD, Professor of Plant Pathology and Environmental Microbiology and Biology at the Pennsylvania ...

A Q&A about the malicious software known as ransomware

Apr 08, 2015

Ransomware is a growing threat to computer users, who can suddenly find they're unable to open or use their files when their machines are infected. The malicious software can attack any user—an individual, small business, ...

The hacking tools that terrorise the internet

Mar 06, 2015

Hacking is a state of mind. Traditionally, hackers like to discover, understand and share the secrets they expose. They like to laugh at the dumb things they find. They're not necessarily in it for the money, ...

Facing the Windows XP apocalypse? Here are some options

Mar 26, 2014

Are you ready for the "XP Apocalypse" on April 8? That's when Microsoft Corp. plans to stop issuing security updates for the aging, but still-popular XP version of its flagship Windows operating system, which ...

Recommended for you

NSA winds down once-secret phone-records collection program

2 hours ago

The National Security Agency has begun winding down its collection and storage of American phone records after the Senate failed to agree on a path forward to change or extend the once-secret program ahead of its expiration ...

Uber drivers fined in Hungary

2 hours ago

The Hungarian tax authority fined Uber drivers in its first probe against the ride-sharing service which the economy ministry said Saturday "ignores passenger safety" and must be made to follow regulations.

Architects to hatch Ecocapsule as low-energy house

22 hours ago

Where people call home depends on varied factors, from poverty level to personal philosophy to vanity to community pressure. Ecocapsule appears to be the result of special factors, a team of architects applying ...

Apple may deliver ways to rev up the iPad, report says

May 23, 2015

MacRumors last month said that the latest numbers from market research firm IDC's Worldwide Quarterly Tablet Tracker revealed Apple stayed on as the largest vendor in a declining tablet market. The iPad ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.