Three weeks ago we posted a series of screenshots of bait document files used in targeted attacks. These are files that have been used to infect specific individuals in different organizations in order to gain access to their computer.
All the documents shown below contained exploits that installed backdoors. Targets of these attacks are not known.
Again, this was just a quick sampling; we get a lot of these.
We'll be blogging more tomorrow about a change in the hostnames used in these attacks.
P.S. Feel free to leave suggestions for translations of the non-English documents in the comments section.