Microsoft Provides Workaround Patch for Duqu Malware

Microsoft finally provided a workaround patch for a Windows vulnerability which was not known previously, but is critical and also exploited by Duqu Trojan for infecting systems.

On late Thursday, Microsoft issued an advisoryon its Security Tech Center that a problem in the "Win32k TrueType font-parsing engine" successfully spread across all versions of Windows starting from XP to the latest Windows 7 and that it is related to the infection of Duqu malware, a Trojan similar to Stuxnet, that infects computers through Word documents.

The official advisory mentioned that, "An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode," and also, "The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights."

The Word document, which is used for infection, contains a Duqu installer that targets a specific organisation and was active for installation during a period of eight-days during the month of August.

Untill now, there are no official confirmation as to how fast it spreads. Symantec has been able to find infections within six set ups across 8 countries. These countries include Switzerland, India, France, Ukraine, Netherlands, Sudan, Vietnam and Sudan, as reported by CNet.com.

404

Sorry! Page not found.

The article you requested has either been moved or removed from the site.