Hackers Attack PowerPoint More Than Microsoft Word - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

Hackers Attack PowerPoint More Than Microsoft Word

A MessageLabs report also shows that hackers are forgoing widespread campaigns for targeted attacks that take aim at specific employees inside a company.

For the first time, PowerPoint has surpassed Microsoft Word as the most common exploit vector, and hackers are increasingly pinpointing their enterprise attacks, according to a report out Wednesday from MessageLabs.

There's one specific gang that's running up the numbers on PowerPoint attacks. Most of the attacks are originating from an IP address within Taiwan, the MessageLabs report noted.

The company also pointed out in its study of March messaging attacks that hackers are forgoing the traditional widespread attack for targeted attacks. Instead of spamming out hundreds of thousands of e-mails to try to trick users into divulging critical information, a hacker sends one very specific e-mail to one or two people in a specific position inside the same company.

MessageLabs reported that it discovered 249 separate targeted attacks aimed at 216 organizations in March alone. About 200 of them were one-on-one targeted attacks that comprised a single e-mail designed to infiltrate one organization, the report noted.

That's a significant increase over March 2006, when there were only one or two targeted attacks launched every day.

"The bad guys know which organizations have data worth stealing and are picking them out one by one," said Alex Shipp, senior antivirus technologist at MessageLabs, in a written statement. "These targeted attacks are highly difficult to detect as the large majority consist of a single e-mail to one individual, which means they never have antivirus signatures created by traditional antivirus software. However, if you happen to be that one company targeted, the impact could be devastating."

A report from Kaspersky Lab in February predicted that widespread worm epidemics would continue to be replaced by targeted attacks on specific companies this year.

A few years ago, major worldwide worm attacks, such as the one caused by Mytob, were a nightmare for IT managers. Worms swept across the Internet, infecting millions of computers and costing companies billions of dollars in clean-up. The threat, while still alive and well, is changing its form.

Today, managers' worries are turning to the pinpoint attacks. In February, hackers used a zero-day flaw in Microsoft Word to launch targeted attacks against a specific company. Hackers used the then-unknown vulnerability to launch an attack against two employees at the same company earlier this month. The Trojan not only focused in on one company but also specifically targeted the two victims based on what they do there.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
Slideshows
IT Careers: 10 Industries with Job Openings Right Now
Cynthia Harvey, Freelance Journalist, InformationWeek,  5/27/2020
Commentary
How 5G Rollout May Benefit Businesses More than Consumers
Joao-Pierre S. Ruth, Senior Writer,  5/21/2020
News
IT Leadership in Education: Getting Online School Right
Jessica Davis, Senior Editor, Enterprise Apps,  5/20/2020
Register for InformationWeek Newsletters
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll