Hackers unleash industrial spy Trojan
Security firm MessageLabs, which discovered the attack, explained that the Trojan targets only a small number of email addresses - 17 in this case - rather than mass mailing itself to as many recipients as possible.
The attack is designed to exploit a vulnerability in Microsoft Word caused by a buffer overflow when handling macro names. A Word document containing a long macro name overflows a buffer allowing the embedded Trojan to execute (see Microsoft Security Bulletin MS03-050).
Utilising text content potentially relevant to the target audience, the email encourages the recipients to open an attached Word document claiming to provide further information.
The link for this article located at vnunet is no longer available.