{"id":4376,"date":"2012-04-04T12:55:14","date_gmt":"2012-04-04T19:55:14","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=4376"},"modified":"2016-02-12T10:15:19","modified_gmt":"2016-02-12T18:15:19","slug":"windows-hacker-tool-creates-word-documents-that-can-infect-macs","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/","title":{"rendered":"Windows Hacker Tool Creates Word Documents that Can Infect Macs"},"content":{"rendered":"<p>We recently published information about <a href=\"https:\/\/www.intego.com\/mac-security-blog\/tibet-c-malware-delivered-by-poisoned-word-documents-installs-backdoors-on-macs\/\">poisoned Word documents that can infect Macs with a backdoor<\/a>. These documents look like Word files, but, when double-clicked, after displaying text, they infect Macs with a backdoor. <\/p>\n<p>Intego&#8217;s Malware Research Team has found samples of a Windows tool called MalHost-Setup.exe which can be used to create this type of infected Word file. (It can also be used to create Excel and PowerPoint files, but Intego has not seen any samples of these files being used to deliver this type of malware yet.) The sample found included an infected Word file with Mac-specific payload.<\/p>\n<p>As we pointed out in our blog post, &#8220;the code in these Word documents is not encrypted, so any malware writer who gets copies of them may be able to alter the code and distribute their own versions of these documents.&#8221; This tool suggests that this type of infected Microsoft Office file will become more common.<\/p>\n<p>All users of Microsoft Office should make sure they have applied all the available security updates. The last security update for Office 2004 and 2008 was in <a href=\"https:\/\/www.intego.com\/mac-security-blog\/microsoft-updates-office-2008-and-2011-for-security-issues\/\">December 2011<\/a>. Follow the link to download the appropriate update if your version of Office is not up to date. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intego&#8217;s Malware Research Team has found samples of a Windows tool called MalHost-Setup.exe which can be used to create infected Word files that can target Macs.<\/p>\n","protected":false},"author":3,"featured_media":3673,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,5],"tags":[62,174,86,87,91,149],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Intego&#039;s Malware Research Team has found samples of a Windows tool called MalHost-Setup.exe which can be used to create infected Word files that can target Macs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows Hacker Tool Creates Word Documents that Can Infect Macs - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Intego&#039;s Malware Research Team has found samples of a Windows tool called MalHost-Setup.exe which can be used to create infected Word files that can target Macs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-04-04T19:55:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:15:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"128\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png\",\"width\":\"128\",\"height\":\"128\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/\",\"name\":\"Windows Hacker Tool Creates Word Documents that Can Infect Macs - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#primaryimage\"},\"datePublished\":\"2012-04-04T19:55:14+00:00\",\"dateModified\":\"2016-02-12T18:15:19+00:00\",\"description\":\"Intego's Malware Research Team has found samples of a Windows tool called MalHost-Setup.exe which can be used to create infected Word files that can target Macs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows Hacker Tool Creates Word Documents that Can Infect Macs\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Windows Hacker Tool Creates Word Documents that Can Infect Macs\",\"datePublished\":\"2012-04-04T19:55:14+00:00\",\"dateModified\":\"2016-02-12T18:15:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#webpage\"},\"wordCount\":210,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png\",\"keywords\":[\"Hacker Tool\",\"Mac\",\"Malware\",\"Microsoft\",\"Office\",\"Windows\"],\"articleSection\":[\"Malware\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Intego's Malware Research Team has found samples of a Windows tool called MalHost-Setup.exe which can be used to create infected Word files that can target Macs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/","og_locale":"en_US","og_type":"article","og_title":"Windows Hacker Tool Creates Word Documents that Can Infect Macs - The Mac Security Blog","og_description":"Intego's Malware Research Team has found samples of a Windows tool called MalHost-Setup.exe which can be used to create infected Word files that can target Macs.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-04-04T19:55:14+00:00","article_modified_time":"2016-02-12T18:15:19+00:00","og_image":[{"width":"128","height":"128","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png","width":"128","height":"128"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/","name":"Windows Hacker Tool Creates Word Documents that Can Infect Macs - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#primaryimage"},"datePublished":"2012-04-04T19:55:14+00:00","dateModified":"2016-02-12T18:15:19+00:00","description":"Intego's Malware Research Team has found samples of a Windows tool called MalHost-Setup.exe which can be used to create infected Word files that can target Macs.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Windows Hacker Tool Creates Word Documents that Can Infect Macs"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Windows Hacker Tool Creates Word Documents that Can Infect Macs","datePublished":"2012-04-04T19:55:14+00:00","dateModified":"2016-02-12T18:15:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#webpage"},"wordCount":210,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png","keywords":["Hacker Tool","Mac","Malware","Microsoft","Office","Windows"],"articleSection":["Malware","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/windows-hacker-tool-creates-word-documents-that-can-infect-macs\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-18A","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4376"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=4376"}],"version-history":[{"count":2,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4376\/revisions"}],"predecessor-version":[{"id":50203,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4376\/revisions\/50203"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/3673"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=4376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=4376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=4376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}