Security Alerts & News
by Tymoteusz A. Góral

#823 How RTF malware evades static signature-based detection
Rich Text Format (RTF) is a document format developed by Microsoft that has been widely used on various platforms for more than 29 years. The RTF format is very flexible and therefore complicated. This makes the development of a safe RTF parsers challenging. Some notorious vulnerabilities such as CVE-2010-3333 and CVE-2014-1761 were caused by errors in implementing RTF parsing logic.

In fact, RTF malware is not limited to exploiting RTF parsing vulnerabilities. Malicious RTF files can include other vulnerabilities unrelated to the RTF parser because RTF supports the embedding of objects, such as OLE objects and images. CVE-2012-0158 and CVE-2015-1641 are two typical examples of such vulnerabilities – their root cause does not reside in the RTF parser and attackers can exploit these vulnerabilities through other file formats such as DOC and DOCX.

Another type of RTF malware does not use any vulnerabilities. It simply contains embedded malicious executable files and tricks the user into launching those malicious files. This allows attackers to distribute malware via email, which is generally not a vector for sending executable files directly.

Plenty of malware authors prefer to use RTF as an attack vector because RTF is an obfuscation-friendly format. As such, their malware can easily evade static signature based detection such as YARA or Snort. This is a big reason why, in this scriptable exploit era, we still see such large volumes of RTF-based attacks.
Read more
#823 How RTF malware evades static signature-based detection
#822 Will CryptXXX replace TeslaCrypt after ransomware shakeup?
#821 Beware of keystroke loggers disguised as USB phone chargers, FBI warns
#820 Unraveling Turla APT attack against Swiss defense firm
#819 SWIFT to unveil new security plan in the wake of Bangladesh heist
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12