New trojan detected for Microsoft Word

May 22, 2006

A new Trojan virus has been detected that uses a Microsoft Word vulnerability to infect computers, Panda Software Labs reported.

According to the malware software/research firm, the virus called 1Table.A, releases the Gusi Trojan on the system, allowing infected computers to be controlled remotely.

The vulnerability of the Word program allows "the execution of code on affected systems and, more dangerously, allows the construction of malicious code which is indistinguishable at first glance from a normal Word file," Panda Software Labs said.

It also affects versions of MS Office 2003 and XP, and so far, no patch has been released by Microsoft that addresses the vulnerability.

While, the virus can not send itself automatically, the firm said, it can still be done if a malicious user were to intervene. And still, the virus can be sent as attachments to e-mail messages or downloaded from web pages or P2P file-sharing networks.

"This is a very serious security problem, as it allows malicious Word documents to be created which could take a host of actions on computers," Panda Labs' director Luis Corrons said. "Cyber-crooks have seen the enormous potential of this vulnerability, and it has only taken a few hours until we have seen the first malicious code that exploits it, and no doubt there will be more shortly."

Copyright 2006 by United Press International

Explore further: Review: Windows Phone advances with 8.1 update

add to favorites email to friend print save as pdf

Related Stories

Facing the Windows XP apocalypse? Here are some options

Mar 26, 2014

Are you ready for the "XP Apocalypse" on April 8? That's when Microsoft Corp. plans to stop issuing security updates for the aging, but still-popular XP version of its flagship Windows operating system, which ...

Hydra flash memory outperforms other top storage mediums

Apr 06, 2010

(PhysOrg.com) -- Although today flash memory is primarily used as a removable storage medium, it's currently becoming more and more appealing for a wider variety of applications. Moving beyond memory cards ...

US military prepares new rules for cyber war: Panetta

Oct 12, 2012

The United States faces a growing threat of a "cyber-Pearl Harbor" and has drafted new rules for the military that would enable it to move aggressively against digital attacks, Defense Secretary Leon Panetta ...

Recommended for you

Enabling dynamic prioritization of data in the cloud

Apr 14, 2014

IBM inventors have patented a cloud computing invention that can improve quality of service for clients by enabling data to be dynamically modified, prioritized and shared across a cloud environment.

Uber meets local lookalikes in Asia taxi-app wars

Apr 14, 2014

Riding on its startup success and flush with fresh capital, taxi-hailing smartphone app Uber is making a big push into Asia. There's a twist, though: Instead of being the game-changing phenomena it was in ...

User comments : 0

More news stories

Intel reports lower 1Q net income, higher revenue

Intel's earnings fell in the first three months of the year amid a continued slump in the worldwide PC market, but revenue grew slightly because of solid demand for tablet processors and its data center services.

Low Vitamin D may not be a culprit in menopause symptoms

A new study from the Women's Health Initiative (WHI) shows no significant connection between vitamin D levels and menopause symptoms. The study was published online today in Menopause, the journal of The North American Menopa ...

Astronomers: 'Tilt-a-worlds' could harbor life

A fluctuating tilt in a planet's orbit does not preclude the possibility of life, according to new research by astronomers at the University of Washington, Utah's Weber State University and NASA. In fact, ...