News

Malicious Code Exploit Discovered in Microsoft Office

Finjan Software (www.finjan.com) announced that they have discovered a new exploit involving Microsoft Windows scrap files that could be used to deliver Trojan attacks. Microsoft Office applications can be used to create "scrap" files (.SHS extension) to hide executable programs.

Because the file extension on .SHS files is always hidden, a file can be falsely named with a harmless-seeming file extension (.TXT, .JPG, .GIF), which a user will be more likely to open. Once opened, a scrap file will transmit the Trojan executable program to the user's machine.

Microsoft Windows scrap files are created when a file is copied into an open Microsoft Office document and then copied and pasted onto the Windows desktop. The new scrap file is created with the hidden file extension .SHS, but can easily be renamed by a malicious user. When distributed via e-mail messages or instant message file transfer or other Web-based media, a scrap file's extension becomes visible, but once saved to the hard drive, the .SHS extension will disappear again.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Microsoft Expands Azure AD Password Lengths, Adds Conditional Access Controls

    Microsoft announced a couple of Azure Active Directory enhancements this week regarding password lengths and new conditional access controls for IT pros.

  • Attack Surface Analyzer 2.0 Available for Checking Software Installs

    Microsoft this week described Attack Surface Analyzer 2.0, an updated tool for checking software installations that's now built using open source code.

  • What Causes Hyper-V Replication Failures?

    Hyper-V replication failures happen rarely, but their impact can be catastrophic when they do. Know the scenarios that are likely to trigger a replication failure.

  • Microsoft Touts Using HyperClear To Address Intel Processor Woes

    Microsoft is again promoting its HyperClear Hyper-V hypervisor technology as a potential balm for organizations trying to come to grips with Intel's latest speculative execution side-channel attack disclosures.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.