APT attackers are increasingly using booby-trapped RTF documents, experts say

Microsoft Officer RTF parsing vulnerabilities are a common target for attackers who distribute advanced persistent threats

Booby-trapped RTF documents are one of the most common types of malicious Microsoft Office files that are used to infect computers with advanced persistent threats (APTs), according to security researchers from Trend Micro.

"Taking data from exploit documents gathered last April, we can see that the most exploited MS Office software is MS Word," said Trend Micro senior threat researcher Ryan Flores, in a blog post on Wednesday.

The company's statistics show that 63 percent of the malicious Microsoft Office documents intercepted in April exploited vulnerabilities in Microsoft Word.

Out of those vulnerabilities, the most commonly targeted ones were CVE-2010-3333 and CVE-2012-0158, which stem from bugs in Microsoft Word's code for parsing Rich Text Format content.

RTF content can either be saved in a document with an .rtf extension, or can be embedded into a .doc file. In fact, many malicious documents that exploited CVE-2010-3333 and CVE-2012-0158 have had a .doc extension.

The fact that the 2-year-old CVE-2010-3333 vulnerability is still widely exploited in attacks today shows that companies from many industries are failing to keep their Microsoft Office installations up to date, Flores said.

This is particularly troubling because Microsoft just patched a new Microsoft Word RTF parsing vulnerability Tuesday that could allow remote code execution.

The vulnerability is identified as CVE-2012-0183 and affects Microsoft Office 2003 and 2007 for Windows, as well as Microsoft Office 2008 and 2011 for Mac OS.

Considering the attackers' rapid adoption of exploits for CVE-2012-0158, a RTF parsing vulnerability patched by Microsoft in April, it's likely that CVE-2012-0183 will also be targeted soon.

"Within a span of two weeks, CVE-2012-0158 went from zero to actually surpassing CVE-2010-3333 as the preferred exploit of attackers," Flores said. "This just shows that the time window for patching critical vulnerabilities is small, which requires due diligence and discipline on patch management by organizations."

APT attacks that use boobytrapped documents don't only target Windows users. Back in March, researchers from security firm AlienVault, analyzed an APT attack against Tibetan activists that exploited a vulnerability in Microsoft Office for Mac to install Mac malware.

"With the current interest being shown by cybercriminals in infecting Macs, it would be extremely sensible for all users of Microsoft Office on the Mac to update their systems as a matter of priority," said Graham Cluley, a senior technology consultant at antivirus vendor Sophos, in a blog post on Wednesday.

"Note that if you rely solely upon the Software Update feature built into Mac OS X it will not update the Microsoft product," Cluley said. Security patches for Microsoft Office for Mac are delivered through the program's own updating mechanism.

Show Comments