- http://www.websense....php?AlertID=713
December 06, 2006
"...As with previous Office exploits, we expect email to be used as the initial infection vector, with lures to run attached documents. The exploits *usually* then connect to remote sites (that is, they are Trojan Downloaders) to download additional payloads. The Websense Threatwatcher process mines the malicious code that is being downloaded through Trojan Downloaders such as Office zero-day exploits. Although attacks in the past have been limited in target numbers, business sectors, and regions, there is a potential for more widespread attacks with this Word zero-day."
> http://forums.tomcoy...a...st&p=336467

Edited by AplusWebMaster, 26 January 2007 - 08:49 PM.