Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
The vulnerability (or vulnerabilities) leveraged by the specially crafted document file are usually application- or platform-specific; a particular program (or even a specific version of the program) must be installed on the machine in order for the exploit to be effective.
To prevent exploitation of such vulnerabilities, please refer to the application vendor for the latest updates and additional advice.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest detection database updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it to F-Secure Labs for re-analysis.
NOTE If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note You need administrative rights to change the settings.
The Microsoft Office productivity software suite is one of the most commonly found set of programs on computers around in the world, on both business and personal computers. The suite includes the Word, Excel, Powerpoint, Outlook, OneNote and Access programs, as well as other less commonly used software.
Because Microsoft Office is so commonly used, most computer users are familiar with it and generally trust files associated with its programs. Attackers thus try to exploit the implicit trust and familiarity users have with such files by secretly embedding malicious code into document files and distributing them, either en mass or to targeted users.
These 'bait' files are often specifically designed, or 'socially engineered', to look legitimate. For example, they may use filenames such as 'resume.doc' or 'invoice.docx', and contain content (sometimes stolen from actual legitimate documents) that seem authentic. The careful crafting of the bait files is meant to encourage the user to believe the document is trustworthy and open the file - and in so doing, unsuspectingly run the malware.
Some W97M malware exploit vulnerabilities in the Microsoft Word program itself to execute code on the user's computer, though this is relatively less common, since it requires more technical skill to accomplish. Other W97M malware are independent programs that only use the Word document as a 'carrrier', and once run they can operate separately. One example of this type of malware is Trojan:W97M/Streedom.A.
The most common type of W97M malware however is a malicious macro embedded into the Word document itself. A macro is a tiny program that can be legitimately used in Word to automate some functions, but an attacker can also craft a macro to perform malicious actions. Most often, these malicious macros are used by attackers to download additional malware onto the user's computer. Some representative examples of macro malware in Word documents are:
With changes in the threat landscape today, F-Secure has updated its platform designation convention and malware affecting this platform now uses the platform designation, 'WM'.
Date Created: -
Date Last Modified: -