segunda-feira, 27 de abril de 2015

Russian Hackers Exploit Windows, Flash Player Zero-Day Flaws in Targeted Attack

A Highly Targeted Cyber Attack Believed to be Run by Russian Hackers has been Observed a Week Ago, Leveraging a Zero-Day in Flash Player and One in Windows that, Allowed Privilege Escalation. The Incident was Spotted on April 13 by Security Researchers from FireEye, Who Allege that, the Threat Actor is a Russian Group they Call, APT28, Whose Activity has been Traced as Far Back as 2007. The Security Glitch in Flash Player (CVE-2015-3043), has been Patched by Adobe in an Update Released a Day after FireEye Learned about APT28’s Attack. In the Security Bulletin for the Update, the Developer Informed that, an Exploit for the Flaw Existed in the Wild. As for the Privilege Escalation Flaw in Windows (CVE-2015-1701), it Continues to be a Zero-Day as Microsoft has to Release a Patch for it. The Company is currently Working on a Patch. FireEye Researchers Say in a Blog Post on Saturday that, the Attackers Relied on the Flash Vulnerability to Gain Access to the Targeted System and then Exploited the Windows Flaw to Increase their Grip on the Machine.


The Attack would Start with Tricking the User into Following a Website that Served the Flash Exploit for CVE-2015-3043, which Would Run a Payload that Achieved Privilege Escalation, Allowing ATP28 to Execute Code with System Rights, thus Being Able to Access any Region on the Computer. Compromising Systems this Way is No Longer Successful if Users Have the Current Version of Flash Player (v17.0.0.169) Installed. Also, the Zero-Day in Microsoft’s Operating System Affects only Windows 7 and Earlier. Researchers Say that, the Attack was Deployed against an International Government Entity that Fits the Target Profile the APT28 Hackers Focus on. Attribution of the Incident has been Done Based on Observed Similarities of the Delivered Malware with Backdoors CHOPSTICK and CORESHELL, Previously Used by the Group.




Info Source:

https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html



0 comentários:

Enviar um comentário