Document malware

Document malware takes advantage of vulnerabilities in applications that let you read or edit documents.

By embedding malicious content within documents, hackers can exploit vulnerabilities in the host applications used for opening the documents. Common examples of document malware include specifically crafted Word, Excel and PDF documents.

The infamous data breach of RSA Security in 2011 started when an employee opened an Excel spreadsheet containing carefully disguised malware.

(See Exploit)

Back to Security Threats A-Z

Back to Threatsaurus Home

download Threatsaurus: A-Z of Threats
Download now