Computer users were warned against a malicious Microsoft  PowerPoint file making the rounds of the Internet, via an attached file  in email messages.
 Security vendor Trend Micro  said the file actually contains an embedded Flash file that exploits  bugs in older versions of Flash Player to drop a backdoor on infected  machines.
 "Users who open the malicious  .PPT  file triggers the shellcode within the Flash file that exploits  CVE-2011-0611, and then drops 'Winword.tmp' in the Temp folder.  Simultaneously, it also drops a non-malicious PowerPoint presentation  file 'Powerpoint.pps,' tricking users into thinking that the malicious  file is just your average presentation file," Trend Micro said in a blog post.
  It said its analysis showed “Winword.tmp” is a backdoor that connects  to remote sites to communicate with a possible malicious user.
  Also, the file is capable of downloading and executing other malware  leaving infected systems susceptible to other, more menacing threats  such as data stealing malware, it added.
 Trend  Micro products can detect the malicious PowerPoint file as  TROJ_PPDROP.EVL and the dropped backdoor file as BKDR_SIMBOT.EVL.
  "Reports, as well as our own analysis, confirmed that this kind of  malware has been used for targeted attacks in the past," it said.
  Trend Micro also noted recent threats are no longer limited to  malicious files disguised as ordinary binaries (such as .EXE file)  attached to emails.
 It said these specially crafted files can be embedded in commonly used files such as PDF, DOC, PPT or XLS files.
  "In this particular scenario, users are unaware of the attack since  TROJ_PPDROP.EVL also displays a non-malicious PowerPoint file to serve  as a decoy," it said.
 On the other hand, it said  this case also shows that cybercriminals are continuously exploiting  previously reported vulnerabilities in popular software such as  Microsoft Office applications and Flash.
 Trend Micro also pointed out old and reported software bugs are still being exploited by attackers.
"This finding highlights two things. First, exploits created for reliable vulnerabilities remain effective cybercriminal tools. Second, most users do not regularly update their systems’ with the latest security patch, which explains why attackers are continuously exploiting these bugs," it said. — RSJ, GMA News
source: gmanetwork.com
