Is the Chinese Government exploiting a hole in Office for Mac?

Chinese authorities may be exploiting a security hole in Microsoft Office for Mac to target the Uyghur people

According to Kaspersky and AlienVault Labs, Chinese authorities may be exploiting a security hole in Microsoft Office for Mac to target the Uyghur people, an ethnic group of people who live in parts of Asia and are seeking independence from Chinese rule.

The targeted attacks exploit an old Office for Mac vulnerability (CVE-2009-0563) that was actually fixed over three years ago.

Kaspersky says it has noticed a "significant spike in the number of attacks during Jan 2013 and Feb 2013, indicating the attackers are extremely active at the moment."

Phishing emails have been sent to the Uyghur community that include Microsoft Word documents, which once open, activate a Mac OS X backdoor that "would initiate a connection with the server, and its "tshd_put_file" function was configured to drop stolen data in the "/downloads/" directory located there", writes Kaspersky.

The hackers are able to remotely control the computer and spy on its user's activities.

One of the corrupt files details the "Concerns over Uyghur People's Fundamental Rights Under the New Chinese Leadership". The documents can be identified by the author name: "Captain".

Similar attacks have been reported against other ethnic groups, including the Tibetan people and Uighur activists.

Follow Karen Haslam on Twitter / Follow MacworldUK on Twitter

Related:

Mac backdoor used in attacks against Uighur activists

The worst security exploits, fails and blunders: 2012 in review

Security expert claims Apple will lose out to 'open, sexy, flexible' competitors

Kaspersky Security for Mac review

Mountain Lion and Gatekeeper: What you need to know

Flashback the wake up call Apple needed: Kaspersky

Join the CSO newsletter!

Error: Please check your email address.

Tags MacapplicationsMicrosoftsecuritysoftwareOffice suitesExploits / vulnerabilities

More about AppleKasperskyMicrosoft

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Karen Haslam

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place