{"id":19228,"date":"2022-06-01T18:40:04","date_gmt":"2022-06-02T02:40:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/06\/01\/news-12961\/"},"modified":"2022-06-01T18:40:04","modified_gmt":"2022-06-02T02:40:04","slug":"news-12961","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/06\/01\/news-12961\/","title":{"rendered":"CVE-2022-30190: Microsoft Support Diagnostic Tool (MSDT) RCE Vulnerability \u201cFollina\u201d"},"content":{"rendered":"<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12\">\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\"><\/div>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>At the end of last week, @nao_sec, an independent cyber security research team, tweeted about a malicious Microsoft Word document submitted from Belarus that leverages remote templates to execute a PowerShell payload using the &quot;ms-msdt&quot; MSProtocol URI scheme. Additional developments over the weekend identified the issue as a new unpatched vulnerability in Windows. A successful attack results in a remote, unauthenticated attacker taking control of an affected system. A publicly available Proof-of-Concept soon followed.<\/p>\n<p>This issue is referred to as \u201cFollina\u2019 and has a CVE assignment of CVE-2022-30190.<\/p>\n<p>The name of the vulnerability is credited to security researcher Kevin Beaumont. &quot;Follina&quot; was derived from his analysis of the 0-day that contained code referencing &quot;0438&quot;, which is the area code of Follina, Italy. Most of the time, it\u2019s a bad sign when a vulnerability is crowned with a unique name (having a mind-shaking logo is usually the last dagger \u2013 such as Heartbleed, Shellshock, and EternalBlue, but thankfully, this issue is not in the same league as those.<\/p>\n<p>As FortiGuard Labs is on high watch for the development of proof of concept code for CVE-2022-30190, this blog intends to raise awareness of this critical vulnerability and to urge administrators and various organizations to take quick corrective action until Microsoft releases a patch. <\/p>\n<p style=\"margin-left: 40.0px;\"><b>Affected platforms:<\/b> Microsoft Windows<br \/> <b>Impacted parties: <\/b>Microsoft Windows Users<br \/> <b>Impact:<\/b> Full Control of Affected Machine<br \/> <b>Severity level: <\/b>Critical <\/p>\n<h2>Impact Assessment<\/h2>\n<p>The first question you probably would ask is how bad this vulnerability is. CVE-2022-30190 is rated as CVSS 7.8 (Critical), and there are a number of reasons for it.<\/p>\n<p>This vulnerability is in the Microsoft Support Diagnostic Tool (MSDT), a tool from Microsoft that collects and sends system information back to Microsoft Support for problem diagnostics, such as issues with device drivers, hardware, etc. This tool is in all versions of Windows, including Windows Server OS. Because of the lack of an available patch from Microsoft (as of June 1<sup>st,<\/sup> 2022), machines that are not protected by endpoint software or a mitigation strategy are vulnerable to Follina.<\/p>\n<p>As proof-of-concept code is publicly available, this code can be freely used by security researchers, administrators, and threat actors alike. As such, attacks that leverage CVE-2022-30190 are expected to increase over the next few days and weeks.<\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/what-is-protected-view-d6f09ac7-e6b9-4495-8e43-2bbcdbcb6653\" target=\"_blank\">Protected View<\/a>, a feature in Microsoft Office that opens Office documents in read-only mode with macros and other content disabled, can prevent this attack. However, reports from researchers have revealed that if a document is converted to Rich Text Format (RTF) format, simply previewing the document in Windows Explorer can trigger the exploit, bypassing Protected View. At the time of writing, Microsoft\u2019s latest advisory has not confirmed this nor whether this is another exploitation vector.<\/p>\n<p>On a side note, despite using \u201cremote\u201d in the vulnerability name, the attack happens locally, and user interaction is required for the attack to work. Microsoft\u2019s advisory calls out this point: \u201cThe word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.\u201d<\/p>\n<p>Additionally, the vulnerability has already experienced in-the-wild attacks. As shown in the timeline at the end of this blog (see Timeline), a series of initial attacks were reportedly observed in March 2022, targeting the Philippines, Nepal, and India. Additional files were submitted to VirusTotal from Russia and Belarus. Those attacks were most likely targeted attacks as the domains involved reveal little activity in our telemetry.<\/p>\n<p>Due to the severity of the vulnerability, the United States Cybersecurity &amp; Infrastructure Security Agency (CISA) issued an <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/05\/31\/microsoft-releases-workaround-guidance-msdt-follina-vulnerability\" target=\"_blank\">advisory<\/a> on May 31<sup>st,<\/sup> urging users and administrators to apply necessary workarounds as soon as possible.<\/p>\n<h2>Exploit<\/h2>\n<p>The vulnerability that exists within msdt.exe is the Microsoft Support Diagnostic Tool. Normally, this tool is used to diagnose faults with the operating system and then report and provide system details back to Microsoft Support.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--6 aem-GridColumn--offset--default--3\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/analysis-of-follina-zero-day\/_jcr_content\/root\/responsivegrid\/image.img.png\/1654121544659\/fig1.png\" alt=\"Screenshot of The Microsoft Support Diagnostic Tool\"\/>         <\/noscript>          <span class=\"cmp-image--title\"> Figure 1. The Microsoft Support Diagnostic Tool as is meant to be seen.<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p><span style=\"\">The vulnerability allows a malicious actor to effectively execute arbitrary code with the same privileges as the application calling it. As has been the case with the original reporting of this from @nao_sec and subsequent experimentation in the wider security community, the calling application is quite often a tool in Microsoft Office (Word, Excel, Outlook, etc.).<\/span><\/p>\n<p>The original document and subsequent HTML file can be found <a href=\"https:\/\/www.virustotal.com\/gui\/file\/4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784\/detection\" target=\"_blank\" style=\"background-color: rgb(255,255,255);\">here<\/a><span style=\"\"> and <\/span><a href=\"https:\/\/www.virustotal.com\/gui\/file\/8e986c906d0c6213f80d0224833913fa14bc4c15c047766a62f6329bfc0639bd\" target=\"_blank\" style=\"background-color: rgb(255,255,255);\">here<\/a><span style=\"\">.<\/span> <\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/analysis-of-follina-zero-day\/_jcr_content\/root\/responsivegrid\/image_715565917.img.png\/1654121582072\/fig2.png\" alt=\"Original OLE object showing the download location of the subsequent HTML file.\"\/>         <\/noscript>          <span class=\"cmp-image--title\">  Figure 2. Original OLE object showing the download location of the subsequent HTML file.<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>As shown in Figure 2, the document found by @nao_sec used an embedded OLE Object inside a Word document that was modified to call an external website to download an HTML document. This document then invoked msdt.exe, followed by several PowerShell commands.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/analysis-of-follina-zero-day\/_jcr_content\/root\/responsivegrid\/image_1873412324.img.png\/1654125598669\/img3.png\" alt=\"Screenshot of HTML file invoking MSDT.\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 3. HTML file invoking MSDT.<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Figure 3 shows the original HTML payload, which required several lines with the letter &#8216;A&#8217; (61) to be commented out of the script in order to execute. MSDT was then invoked using character and Base64 encoding to obfuscate the actual command.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/analysis-of-follina-zero-day\/_jcr_content\/root\/responsivegrid\/image_2063846166.img.png\/1654121652400\/fig4.png\" alt=\"Example of decoded command.\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 4. Decoded command.<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Many further examples have been uploaded to VirusTotal that invoke Calc and other benign Windows tools as a method to test the vulnerability without causing damage.<\/p>\n<h2>Active Exploitation<\/h2>\n<p>The TA413 APT group, a hacking outfit linked to Chinese state interests, has adopted this vulnerability in attacks against the international Tibetan community. As observed on May 30 by security researchers, threat actors are now using CVE-2022-30190 exploits to execute malicious code via the MSDT protocol when targets open or preview Word documents delivered in ZIP archives. Campaigns have impersonated the &#8216;Women Empowerments Desk&#8217; of the Central Tibetan Administration and use the domain tibet-gov.web[.]app.<\/p>\n<p>The security researchers also spotted DOCX documents with Chinese filenames being used to install malicious payloads detected as password-stealing Trojans via &quot;hxxp:\/\/coolrat[.]xyz&quot;.<\/p>\n<p>At the time of writing, researchers have discovered limited exploitation of the vulnerability in the wild. One instance of active exploitation of &#8216;Follina&#8217; was conducted by Chinese APT actor &#8216;TA413&#8217;.<\/p>\n<h2>Attack Vector<\/h2>\n<p>At the time of this writing, all known attacks used Microsoft Word document files that were most likely delivered via email. Theoretically, any applications that allow an OLE object to be embedded would be a viable execution mechanism.<\/p>\n<h2>In the Wild Attack<\/h2>\n<p>One of the real-world attacks that leverage CVE-2022-30190 is a Microsoft Word file submitted to VirusTotal from Saudi Arabia on June 1<sup>st<\/sup> (SHA2: 248296cf75065c7db51a793816d388ad589127c40fddef276e622a160727ca29), which MalwareHunterTeam posted in a tweet:<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/analysis-of-follina-zero-day\/_jcr_content\/root\/responsivegrid\/image_380185480.img.png\/1654125720589\/fig5.png\" alt=\"Example of Malicious Word file that was used in an attack leveraging CVE-2022-30190.\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 5. Malicious Word file that was used in an attack leveraging CVE-2022-30190.<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The doc file retrieves an HTML file from 212[.]138[.]130[.]8\/analysis.html, which abuses MSDT to fetch the next stage payload \u201csvchost.exe\u201d from a remote location and then execute it.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--10 aem-GridColumn--offset--default--1\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/analysis-of-follina-zero-day\/_jcr_content\/root\/responsivegrid\/image_384978782.img.png\/1654121937225\/img6.png\" alt=\"Contents of retrieved analysis.html\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 6. Contents of retrieved analysis.html<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h2>Payload Analysis<\/h2>\n<p>The Saudi Arabian DOCX document eventually leads to the download and execution of an executable. This executable (SHA256: 4DDA59B51D51F18C9071EB07A730AC4548E36E0D14DBF00E886FC155E705EEEF) is a variant of Turian, which was analyzed by ESET (https:\/\/www.welivesecurity.com\/2021\/06\/10\/backdoordiplomacy-upgrading-quarian-turian\/)\u00a0 almost a year ago. This current variant uses the same one-byte XOR key (0xA9) as the previously analyzed Turian sample.\u00a0<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/analysis-of-follina-zero-day\/_jcr_content\/root\/responsivegrid\/image_1573680796.img.png\/1654121993952\/fig6.png\" alt=\"Example of XOR key 0xA9 used for decryption\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 7. XOR key 0xA9 used for decryption<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>This sample also has the functionality to try and determine what role the infected computer plays in the domain.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/analysis-of-follina-zero-day\/_jcr_content\/root\/responsivegrid\/image_1232720477.img.png\/1654122002490\/fig7.png\" alt=\"Screenshot of functionality to determine domain role\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 8. Functionality to determine domain role<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Similar to the old Turian sample, this variant uses the same headers to connect to the C2 server.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/analysis-of-follina-zero-day\/_jcr_content\/root\/responsivegrid\/image_1556443686.img.png\/1654122208726\/img9.png\" alt=\"Screenshot of Connection headers code\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 9. Connection headers<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>This sample creates \u201ctmp.bat\u201d, which is used to set RUN keys in the registry for persistence purposes.<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn aem-GridColumn--default--12\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/analysis-of-follina-zero-day\/_jcr_content\/root\/responsivegrid\/image_1525093743.img.png\/1654126130388\/img100.png\" alt=\"Screenshot of the Content of the\u201dtmp.bat\u201d file\"\/>         <\/noscript>          <span class=\"cmp-image--title\"> Figure 10. Content of the\u201dtmp.bat\u201d file<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Note the mixed usage of upper and lowercase letters, which is the same as the old Turian sample.<\/p>\n<p>This latest variant uses www[.]osendata[.] com as its C2 server.<\/p>\n<p>Another Turian sample similar to this latest variant has a SHA256 hash of\u00a0 34DC42F3F486EC282C5E3A16D81A377C2F642D87994AE103742DF5ED5804D0F7 and a C2 server of www[.]tripinindian[.]com.<\/p>\n<h2>Mitigation<\/h2>\n<p>Microsoft has provided the following mitigation steps in a <a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/05\/30\/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability\/\" target=\"_blank\">blog<\/a> posted on May 30<sup>th<\/sup>, 2022.<\/p>\n<p>CISA also <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/05\/31\/microsoft-releases-workaround-guidance-msdt-follina-vulnerability\" target=\"_blank\">urged<\/a> admins and users to disable the MSDT protocol on their Windows devices after Microsoft reported active exploitation of this vulnerability in the wild.<\/p>\n<h3><span style=\"font-weight: normal;\">Disabling the MSDT URL Protocol:<\/span><\/h3>\n<p>Disabling the MSDT URL protocol prevents troubleshooters from being launched as links, including links throughout the operating system. Troubleshooters can still be accessed using the Get Help application and in System Settings as other or additional troubleshooters. Follow these steps to disable:<\/p>\n<ol>\n<li>Run Command Prompt as Administrator.<\/li>\n<li>To back up the registry key, execute the command \u201creg export HKEY_CLASSES_ROOTms-msdt filename\u201c<\/li>\n<li>Execute the command \u201creg delete HKEY_CLASSES_ROOTms-msdt \/f\u201d.<\/li>\n<\/ol><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/analysis-of-follina-zero-day\/_jcr_content\/root\/responsivegrid\/image_1117848328.img.png\/1654126226140\/img10.png\" alt=\"Screenshot of ms-msdt in Registry Editor\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 11. ms-msdt in Registry Editor<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>How to undo the workaround<\/p>\n<ol>\n<li>Run Command Prompt as Administrator.<\/li>\n<li>To restore the registry key, execute the command \u201creg import filename\u201d<\/li>\n<\/ol>\n<h2>Timeline<\/h2>\n<p>Timeline of CVE-2022-30190 based on information gathered by FortiGuard Labs:<\/p>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn--default--none aem-GridColumn--default--9 aem-GridColumn aem-GridColumn--offset--default--3\">      <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h2>Conclusion<\/h2>\n<p>CVE-2022-30190 has the potential to have significant impact due to its ease of exploitation and ability to bypass Protected View, along with the availability of new PoC code and the lack of a security fix. Administrators and users should monitor updates from Microsoft and apply the patch as soon as it becomes available. Until then, mitigation should be applied as soon as possible.<\/p>\n<h2>Fortinet Protection<\/h2>\n<p>The FortiGuard Antivirus service detects and blocks files associated with CVE-2022-30190 with the following signatures:<\/p>\n<p style=\"margin-left: 40.0px;\">HTML\/CVE_2022_30190.A!tr<\/p>\n<p style=\"margin-left: 40.0px;\">MSWord\/Agent.2E52!tr.dldr<\/p>\n<p style=\"margin-left: 40.0px;\">MSWord\/CVE20170199.A!exploit<\/p>\n<p style=\"margin-left: 40.0px;\">Riskware\/RemoteShell.<\/p>\n<p>Regarding IPS coverage, the following signature will detect the retrieval of remote HTML files that contain the MSDT command:<\/p>\n<p style=\"margin-left: 40.0px;\">MS.Office.MSHTML.Remote.Code.Execution.<\/p>\n<p>The FortiGuard Content Disarm and Reconstruction (CDR) service can detect the attack in real-time and prevent it by disarming the &quot;oleobject&quot; data from Microsoft Office files.<\/p>\n<p>All relevant URLs have been rated as &quot;Malicious Websites&quot; by the FortiGuard Web Filtering service.<\/p>\n<p>For a comprehensive list of Fortinet technologies that prevent exploitation of CVE-2022-30190, please refer to our Outbreak Alert Service page, \u201c<a href=\"https:\/\/www.fortiguard.com\/outbreak-alert\/msdt-follina\">MSDT Follina.<\/a>\u201d<\/p>\n<p>As these attacks require user interaction, it is also suggested that organizations regularly schedule user awareness and training simulations on how to spot a social engineering attack. Fortinet has multiple solutions designed to train users on how to understand and detect phishing threats:<\/p>\n<p>FortiEDR detects post-exploitation behavior associated with the CVE-2022-30190 vulnerability. A KB article detailing how FortiEDR can mitigate this issue<span style=\"\">\u00a0can be found <\/span><a href=\"https:\/\/community.fortinet.com\/t5\/FortiEDR\/Technical-Tip-How-FortiEDR-protects-against-CVE-2022-30190\/ta-p\/213530\" style=\"background-color: rgb(255,255,255);\">here<\/a><span style=\"\">.<\/span><\/p>\n<p>We suggest that organizations have their end users go through our\u00a0FREE\u00a0<a href=\"https:\/\/training.fortinet.com\/?utm_source=blog&amp;utm_campaign=nse-institute\">NSE training<\/a>:\u00a0<a href=\"https:\/\/training.fortinet.com\/local\/staticpage\/view.php?page=nse_1&amp;utm_source=blog&amp;utm_campaign=nse-1\">NSE 1 \u2013 Information Security Awareness<\/a>. It includes a module on Internet threats to train end-users on how to identify and protect themselves from phishing attacks.<\/p>\n<p>In addition, the\u00a0<a href=\"https:\/\/www.fortinet.com\/products\/phishing-simulation\">FortiPhish Phishing Simulation Service\u00a0<\/a>uses real-world simulations to help organizations test user awareness and vigilance to phishing threats and train and reinforce proper practices when users encounter targeted phishing attacks.<\/p>\n<h2>IOCs<\/h2>\n<h3><span style=\"font-weight: normal;\">Files:<\/span><\/h3>\n<p>710370f6142d945e142890eb427a368bfc6c5fe13a963f952fb884c38ef06bfa<\/p>\n<p>fe300467c2714f4962d814a34f8ee631a51e8255b9c07106d44c6a1f1eda7a45<\/p>\n<p>3db60df73a92b8b15d7885bdcc1cbcf9c740ce29c654375a5c1ce8c2b31488a1<\/p>\n<p>4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784<\/p>\n<p>d118f2c99400e773b8cfd3e08a5bcf6ecaa6a644cb58ef8fd5b8aa6c29af4cf1<\/p>\n<p>764a57c926711e448e68917e7db5caba988d3cdbc656b00cd3a6e88922c63837<\/p>\n<p>8e986c906d0c6213f80d0224833913fa14bc4c15c047766a62f6329bfc0639bd<\/p>\n<p>e8f0a2f79a91587f1d961d6668792e74985624d652c7b47cc87367cb1b451adf<\/p>\n<p>4369f3c729d9bacffab6ec9a8f0e582b4e12b32ed020b5fe0f4c8c0c620931dc<\/p>\n<p>1f245b9d3247d686937f26f7c0ae36d3c853bda97abd8b95dc0dfd4568ee470b<\/p>\n<p>bf10a54348c2d448afa5d0ba5add70aaccd99506dfcf9d6cf185c0b77c14ace5<\/p>\n<p>c0c5bf6fe1d3b23fc89e0f8b352bd687789b5083ca6d8ec9acce9a9e2942be1f<\/p>\n<p>248296cf75065c7db51a793816d388ad589127c40fddef276e622a160727ca29<\/p>\n<p>d61d70a4d4c417560652542e54486beb37edce014e34a94b8fd0020796ff1ef7<\/p>\n<p>4f11f567634b81171a871c804b35c672646a0839485eca0785db71647a1807df<\/p>\n<h3><span style=\"font-weight: normal;\">URL(s):<\/span><\/h3>\n<p>sputnikradio[.]net<br \/> xmlformats[.]com<br \/> exchange[.]oufca[.]com[.]au<br \/> 141[.]98[.]215[.]99<br \/> tibet-gov[.]web[.]app <\/p>\n<p><i>Learn more about Fortinet\u2019s\u00a0<a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?utm_source=blog&amp;utm_campaign=fortiguard-labs\">FortiGuard Labs<\/a>\u00a0threat research and intelligence organization and the FortiGuard Security Subscriptions and Services\u00a0<a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?tab=security-bundles&amp;utm_source=blog&amp;utm_campaign=security-bundles\">portfolio<\/a>.<\/i><\/p>\n<\/p><\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\">\n<div id=\"om-b2dxtopzidsdt3fkzfsv-holder\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/analysis-of-follina-zero-day\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/fortinet\/blog\/threat-research<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"\/blog\/threat-research\/analysis-of-follina-zero-day\/_jcr_content\/root\/responsivegrid\/image.img.png\/1654121544659\/fig1.png\"\/><br \/>FortiGuard Labs researchers provide an analysis and assessment of CVE-2022-30190: Microsoft Support Diagnostic Tool (MSDT) RCE vulnerability \u201cFollina.\u201d Read to learn more about this critical vulnerability and how to take quick corrective action until Microsoft releases a patch.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-19228","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19228"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19228\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19228"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}