Microsoft has released a temporary "fix" for a software vulnerability that left computer systems exposed to the Duqu infection. The Trojan malware is thought to have been designed to steal data from industrial organisations. Microsoft said it has traced the root of the exploit back to a flaw in its Win32k Truetype font parsing engine. It offered a workaround download and said its engineers were working on a definitive security update. Microsoft said the vulnerability in its code allowed attackers to "install programs; view, change or delete data; or create new accounts with full user rights". "This vulnerability is related to the Duqu malware," it said. Microsoft said the full update would not be ready this month, and did not provide a target release date. In the meantime it said that the workaround will cause some documents to "fail to display properly". Email attachment The firm's security warning follows an investigation by the Laboratory of Cryptography and Systems Security (Crysys) at Budapest University. Earlier this week it revealed that the malware had been spread using a previously unknown vulnerability embedded in a Microsoft Word document. Internet security firm, Symantec, confirmed that Microsoft had identified the same bit of code. "It is a link point between Microsoft Word and the system software," said Greg Day, Symantec's director of security strategy. "This takes what you type in and turns it into what comes up on the screen." The security firm has confirmed Duqu infections at six different computer networks belonging to unidentified organisations across a total of eight countries. Microsoft's security report noted that the success of the attacks depended on users opening email attachments. "We have taught people for years that clicking on executable files from unknown sources is not sensible, but clicking on a Word document is a normal business practice," Mr Day told the BBC. "Since we think the Duqu attackers do reconnaissance beforehand they might have been able to exploit this to make people more likely to have opened the documents, either by having built up a relationship with them or having used an existing one to gain trust." Mr Day said the lessons for business were to ensure that their security software is up to date and that they have educated their employees to question whether an attachment comes from a trustworthy source.
GMT 16:03 2018 Wednesday ,28 November
Executive Office of Arab Ministers of Communications starts in CairoGMT 09:09 2018 Thursday ,15 November
Syria, Iran discuss enhancing scientific cooperationGMT 09:53 2018 Wednesday ,07 November
Drones bring innovation to Africa, from Morocco to MalawiGMT 11:31 2018 Wednesday ,17 October
Japan high-tech fair CEATEC opens in ChibaGMT 14:03 2018 Monday ,08 October
American scientists awarded 2018 Prize in Economic SciencesGMT 07:35 2018 Monday ,08 October
First foreign space agency opens in Abu DhabiGMT 10:47 2018 Sunday ,07 October
Bahrain hosts World Robotics Olympiad2018GMT 09:20 2018 Thursday ,04 October
UAE participates in World Space WeekMaintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2021 ©
Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2021 ©
Send your comments
Your comment as a visitor