SonicWALL protects users from MDROPPER exploit
- 22 June, 2006 13:39
<p>SONICWALL PROTECTS USERS FROM MDROPPER EXPLOIT</p>
<p>SonicWALL research team issues signatures preventing attacks on new zero day vulnerability in Excel</p>
<p>SYDNEY. – June 22, 2006 – SonicWALL, Inc. (NASDAQ: SNWL) today issued a signature for users of its Internet threat prevention technology to enable protection from an unannounced vulnerability in Microsoft Excel which could lead to hackers taking control of a user's system.</p>
<p>Attackers are actively targeting the vulnerability by sending a malicious Excel document to intended victims, and at least one instance of exploitation has been reported.</p>
<p>In order for this attack to be carried out, a user must first open a malicious Excel document. Samples of malicious Excel spreadsheet files called "okN.xls" have been found containing a Trojan horse, called "Mdropper.J," and a program, "Booli.A", that can download other malware to an infected PC.</p>
<p>SonicWALL has deployed a signature for its Unified Threat Management (UTM) devices that blocks potential Mdropper.J.Excel exploits at the gateway.
SonicWALL, named leader in unit share and factory revenues for security appliances worldwide for the fourth consecutive quarter, according to IDC’s Worldwide Q4 Security Appliance Tracker , delivers zero day gateway anti-virus and intrusion prevention signatures to its subscribers on a continual basis, allowing them to defend against new and existing Internet attacks and exploits.</p>
<p>About SonicWALL, Inc.
Founded in 1991, SonicWALL, Inc. a leading provider of continuous data protection and network, Web and email security solutions. For more information, contact SonicWALL at +1 (408) 745-9600 or visit the company web site at http://www.sonicwall.com/.</p>
- FBI: Email swindlers have now redirected as much as $12bn in payments
- To achieve strong IT security, embrace a framework strategy
- Protecting data in the 2019 financial year: what cloud service providers and customers need to know
- What is a cyber kill chain?
- Penetration tests: What are the benefits? Should every business get one?