By embedding malicious content within documents, hackers can exploit vulnerabilities in the host applications used for opening the documents. Common examples of document malware include specifically crafted Word, Excel and PDF documents.
The infamous data breach of RSA Security in 2011 started when an employee opened an Excel spreadsheet containing carefully disguised malware.
Back to Security Threats A-Z
Back to Threatsaurus Home