Microsoft has released a temporary \"fix\" for a software vulnerability that left computer systems exposed to the Duqu infection. The Trojan malware is thought to have been designed to steal data from industrial organisations. Microsoft said it has traced the root of the exploit back to a flaw in its Win32k Truetype font parsing engine. It offered a workaround download and said its engineers were working on a definitive security update. Microsoft said the vulnerability in its code allowed attackers to \"install programs; view, change or delete data; or create new accounts with full user rights\". \"This vulnerability is related to the Duqu malware,\" it said. Microsoft said the full update would not be ready this month, and did not provide a target release date. In the meantime it said that the workaround will cause some documents to \"fail to display properly\". Email attachment The firm\'s security warning follows an investigation by the Laboratory of Cryptography and Systems Security (Crysys) at Budapest University. Earlier this week it revealed that the malware had been spread using a previously unknown vulnerability embedded in a Microsoft Word document. Internet security firm, Symantec, confirmed that Microsoft had identified the same bit of code. \"It is a link point between Microsoft Word and the system software,\" said Greg Day, Symantec\'s director of security strategy. \"This takes what you type in and turns it into what comes up on the screen.\" The security firm has confirmed Duqu infections at six different computer networks belonging to unidentified organisations across a total of eight countries. Microsoft\'s security report noted that the success of the attacks depended on users opening email attachments. \"We have taught people for years that clicking on executable files from unknown sources is not sensible, but clicking on a Word document is a normal business practice,\" Mr Day told the BBC. \"Since we think the Duqu attackers do reconnaissance beforehand they might have been able to exploit this to make people more likely to have opened the documents, either by having built up a relationship with them or having used an existing one to gain trust.\" Mr Day said the lessons for business were to ensure that their security software is up to date and that they have educated their employees to question whether an attachment comes from a trustworthy source.
GMT 20:46 2018 Tuesday ,23 January
New app to help Indians apply for UAE jobs visaGMT 21:37 2018 Sunday ,14 January
Champagne box-sized satellite launchedGMT 21:32 2018 Sunday ,14 January
Man's best friend goes high techGMT 16:11 2018 Friday ,12 January
UAE Research Programme for Rain Enhancement Science leads the way to new scientific and technological horizonsGMT 09:35 2018 Tuesday ,09 January
SpaceX launches secretive Zuma missionGMT 21:38 2018 Friday ,05 January
Our reliance on technology is having an effect on us allGMT 07:47 2017 Sunday ,24 December
China jails VPN owner for over five yearsGMT 20:59 2017 Saturday ,25 November
Now make unlimited voice, video calls in UAE for Dh50Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2021 ©
Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2021 ©
Send your comments
Your comment as a visitor