microsoft offers temporary fix for duqu malware exploit
Last Updated : GMT 09:07:40
Egypt Today, egypt today
Egypt Today, egypt today
Last Updated : GMT 09:07:40
Egypt Today, egypt today

Microsoft offers temporary fix for Duqu malware exploit

Egypt Today, egypt today

Egypt Today, egypt today Microsoft offers temporary fix for Duqu malware exploit

London - Arabstoday

Microsoft has released a temporary "fix" for a software vulnerability that left computer systems exposed to the Duqu infection. The Trojan malware is thought to have been designed to steal data from industrial organisations. Microsoft said it has traced the root of the exploit back to a flaw in its Win32k Truetype font parsing engine. It offered a workaround download and said its engineers were working on a definitive security update. Microsoft said the vulnerability in its code allowed attackers to "install programs; view, change or delete data; or create new accounts with full user rights". "This vulnerability is related to the Duqu malware," it said. Microsoft said the full update would not be ready this month, and did not provide a target release date. In the meantime it said that the workaround will cause some documents to "fail to display properly". Email attachment The firm's security warning follows an investigation by the Laboratory of Cryptography and Systems Security (Crysys) at Budapest University. Earlier this week it revealed that the malware had been spread using a previously unknown vulnerability embedded in a Microsoft Word document. Internet security firm, Symantec, confirmed that Microsoft had identified the same bit of code. "It is a link point between Microsoft Word and the system software," said Greg Day, Symantec's director of security strategy. "This takes what you type in and turns it into what comes up on the screen." The security firm has confirmed Duqu infections at six different computer networks belonging to unidentified organisations across a total of eight countries. Microsoft's security report noted that the success of the attacks depended on users opening email attachments. "We have taught people for years that clicking on executable files from unknown sources is not sensible, but clicking on a Word document is a normal business practice," Mr Day told the BBC. "Since we think the Duqu attackers do reconnaissance beforehand they might have been able to exploit this to make people more likely to have opened the documents, either by having built up a relationship with them or having used an existing one to gain trust." Mr Day said the lessons for business were to ensure that their security software is up to date and that they have educated their employees to question whether an attachment comes from a trustworthy source.  

egypttoday
egypttoday

Name *

E-mail *

Comment Title*

Comment *

: Characters Left

Mandatory *

Terms of use

Publishing Terms: Not to offend the author, or to persons or sanctities or attacking religions or divine self. And stay away from sectarian and racial incitement and insults.

I agree with the Terms of Use

Security Code*

microsoft offers temporary fix for duqu malware exploit microsoft offers temporary fix for duqu malware exploit



GMT 09:05 2017 Wednesday ,20 September

IMF hails economic measures taken by Lebanese government

GMT 08:58 2017 Friday ,14 April

Sudanese president leaves Bahrain

GMT 15:53 2017 Thursday ,10 August

Israel threatens to blow up Gaza houses

GMT 09:50 2011 Monday ,27 June

Total salary basis of gratuity: Dubai court

GMT 07:14 2014 Sunday ,30 November

Sound and light show held in Brussels

GMT 10:42 2016 Saturday ,19 March

Is migrant crisis swinging back to Libya

GMT 09:41 2011 Tuesday ,09 August

Egypt\'s Marilyn Monroe dies at 82

GMT 10:32 2015 Monday ,26 January

The four players in the Syrian arena

GMT 13:28 2016 Monday ,19 September

Emmy winners in key categories
 
 Egypt Today Facebook,egypt today facebook  Egypt Today Twitter,egypt today twitter Egypt Today Rss,egypt today rss  Egypt Today Youtube,egypt today youtube  Egypt Today Youtube,egypt today youtube

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2021 ©

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2021 ©

egypttoday egypttoday egypttoday egypttoday
egypttoday egypttoday egypttoday
egypttoday
بناية النخيل - رأس النبع _ خلف السفارة الفرنسية _بيروت - لبنان
egypttoday, Egypttoday, Egypttoday