How Does Document Malware Work?

By RMON Networks | March 11, 2016

Document malware takes advantage of vulnerabilities in applications that let you read or edit documents.

By embedding malicious content within documents, hackers can exploit vulnerabilities in the host applications used for opening the documents. Common examples of document malware include specifically crafted Word, Excel and PDF documents..


The infamous data breach of RSA Security in 2011 started when an employee opened an Excel spreadsheet containing carefully disguised malware.


This can also be categorized as an Exploit.

Contact Us

This contact form is not for support requests. Please see the Client Portal to submit a support inquiry.

Leave a Comment

Your email address will not be published.