Adobe 0-days exploited for IEEE aerospace spearphishing attacks

Last week Adobe released a patch for Adobe Flash that fixed a zero day vulnerability, CVE-2013-0633, that is being exploited using Microsoft Office files with embedded flash content delivered via email. The vulnerability is not isolated, it is circulating the news of a new one coded CVE-2013-0634 being exploited trough web browsers such as Firefox and Safari on Mac OSX that has been identified by FireEye security firm.

Adobe credited the CERT of aerospace company Lockheed Martin for discovering that exploit, providing further indication of the caliber of target the hackers were seeking.

Last Friday Adobe’s patched one zero day vulnerability being exploited with malicious embedded Flash content in Microsoft Office documents for Windows that were delivered as emailed attachments.

Security researchers at Alien Vault revealed that attackers delivered the exploits with a targeted spear phishing campaign aimed at the US aerospace sector and industry.

Jaime Blasco, director at Alienvault Labs revealed that one of the Office attachments used to carried the Flash exploit was a 2013 Institute of Electrical and Electronics Engineers (IEEE) Aerospace Conference schedule.

Another sample isolated is  an “Employee Quick Reference Guide” related with an online payroll system, the  Automatic Data Processing (ADP), used by several companies in the US such as Alcoa.

The analysis proposed by FireEye revealed interesting particulars, despite Word files are in English the codepage of Word files are “Windows Simplified Chinese (PRC, Singapore)”. The Word files contain a macro to load an embedded SWF flash object, the flash files contain several ActionScript classes that checks for specific Flash and operating system versions and specific code to trigger the exploit.

“Two oddities of the malware were a coding reference to “Lady Boyle”, a character in the adventure game, “Dishonored”. The authors also failed to obfuscate the malicious Flash file, leaving it open to detection by generic antivirus signatures.”

Also in this case the malicious code was digitally signed with an invalid digital certificate from the Korean gaming company, MGAME Corporation, the same digital document  was also used to sign PlugX remote access tool (RAT) in past attacks on NGOs, according to AlienVault.

“We have seen this certificate dozens of times in the past as part of targeted attacks including NGO’s to sign several RAT files including PlugX.”

The same executable renames itself to try to pass itself off as the Google update process.

The situation is very worrying, the exploit of zero-day vulnerabilities leaves vulnerable target systems. Fortunately it is not so easy to discover a zero-days and in majority of cases their exploits are related to state sponsored attacks. These offensives are typically structured operation susteined by intense researches aimed to discovery a huge quantities of vulnerabilities to exploit during the attacks, campaigns such as the famous Operation Aurora and the most recent Elderwood project.

Pierluigi Paganini

 

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

8 hours ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

15 hours ago

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

21 hours ago

The street lights in Leicester City cannot be turned off due to a cyber attack

A cyber attack on Leicester City Council resulted in certain street lights remaining illuminated all…

22 hours ago

North Korea-linked APT groups target South Korean defense contractors

The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…

1 day ago

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

2 days ago

This website uses cookies.