Join today and you can easily save your favourite articles, join in the conversation and comment, plus select which news your want direct to your inbox.
Join today and you can easily save your favourite articles, join in the conversation and comment, plus select which news your want direct to your inbox.
Property developer Ron Medich had pleaded not guilty to ordering the contract killing of his former business partner Michael McGurk in 2009. Fairfax reporter Kate McClymont takes a look back at the murder trial.
Up Next
'Ill-informed, under-prepared, and psychologically ill-equipped'
'Ill-informed, under-prepared, and psychologically ill-equipped'
Former foreign affairs minister Gareth Evans is urging Australia to reduce its dependence on the United States alliance and accept China as a legitimate "global rule maker".
Outrage over video condoning violence against disobedient wives
The Women of Hizb ut-Tahrir Australia publish a controversial video to Facebook wherein the participants appear to legitimise hitting women that are 'sinful' in the context of their interpretation of Islamic tradition.
Victims are affected by opening compromised Word documents sent to them via email with attachments that are loaded with the bug, security firm Proofpoint said in a blog post on Monday.
The subject line in all cases reportedly reads "Scan Data" and the attachments are named Scan_xxxxxx.doc", where xxxxxx is a random number.
Advertisement
Scanned documents sent via email commonly carry similar subject lines.
The targets were primarily in Australia and across numerous organisations, Proofpoint said.
Targets for the exploit included millions of recipients primarily in Australia. Photo: iStock
Dridex is a so called "zero-day vulnerability", which means that it was sent out with zero notice for Microsoft to create and implement a patch to thwart it.
While most malware requires human intervention to activate it in a system, the Microsoft zero-day can run by simply opening the corrupted Word document.
Proofpoint said its testing revealed computers infected with the malware to be "fully exploited" (exposed).
It recommended that "because of the widespread effectiveness and rapid weaponisation of this exploit, it is critical that users and organisations apply the patch as soon as possible".
"One of the reasons Dridex actors targeted millions of Australian recipients [was] because they wanted to take advantage of the small window before it was patched.
"Sending it to Australian organisations early on Tuesday morning Australian time/late Tuesday US time provided a longer window of possible exposure," Bryan Burns of Proofpoint said.
A Microsoft spokesperson said: "[The vulnerability] was addressed in the April security update released on April 11, 2017.
"Customers who applied the update, or have automatic updates enabled, are already protected."
A similar exploit allowed hackers to steal more than £20 million ($33 million) from British bank accounts in 2015, the BBC reported.