{"id":14007,"date":"2018-12-05T15:10:03","date_gmt":"2018-12-05T23:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/12\/05\/news-7774\/"},"modified":"2018-12-05T15:10:03","modified_gmt":"2018-12-05T23:10:03","slug":"news-7774","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/12\/05\/news-7774\/","title":{"rendered":"New Flash Player zero-day used against Russian facility"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 05 Dec 2018 22:44:59 +0000<\/strong><\/p>\n<p>For the past couple of years, Office documents have largely replaced <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/exploit-kit\/\" target=\"_blank\" rel=\"noopener\">exploit kits<\/a> as the primary malware delivery vector, giving threat actors the choice between social engineering lures and exploits or a combination of both.<\/p>\n<p>While today&#8217;s <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/malspam\/\" target=\"_blank\" rel=\"noopener\">malicious spam (<\/a>malspam) heavily relies on macros and popular vulnerabilities (i.e. <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/eula\" target=\"_blank\" rel=\"noopener\">CVE-2017-11882<\/a>), attackers can also resort to <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/zero-day\/\" target=\"_blank\" rel=\"noopener\">zero-days<\/a> when trying to compromise a target of interest.<\/p>\n<p>In separate blog posts, <a href=\"https:\/\/atr-blog.gigamon.com\/2018\/12\/05\/adobe-flash-zero-day-exploited-in-the-wild\/\" target=\"_blank\" rel=\"noopener\">Gigamon<\/a> and <a href=\"http:\/\/blogs.360.cn\/post\/PoisonNeedles_CVE-2018-15982_EN\" target=\"_blank\" rel=\"noopener\">360 Core Security<\/a> reveal how a new zero-day (<a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb18-42.html\" target=\"_blank\" rel=\"noopener\">CVE-2018-15982<\/a>) for the Flash Player (version 31.0.0.153 and earlier) was recently used in targeted attacks. Despite being a brand new vulnerability, Malwarebytes users were already protected against it thanks to our Anti-Exploit technology.<\/p>\n<p>The Flash object is embedded into an Office document disguised as a questionnaire from a Moscow-based clinic.<\/p>\n<div id=\"attachment_26529\" style=\"width: 914px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/document-1.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26529\" data-permalink=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/12\/new-flash-player-zero-day-used-russian-facility\/attachment\/document-1\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/document-1.png\" data-orig-size=\"904,715\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"document (1)\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/document-1-300x237.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/document-1-600x475.png\" class=\"wp-image-26529 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/document-1.png\" alt=\"\" width=\"904\" height=\"715\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/document-1.png 904w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/document-1-300x237.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/document-1-600x475.png 600w\" sizes=\"auto, (max-width: 904px) 100vw, 904px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">A dot reveals an embedded (and hidden) ActiveX object<\/p>\n<\/div>\n<p>Since Flash usage in web browsers has been declining over the past few years, the preferred scenario is one where a Flash ActiveX control is embedded in an Office file. This is something we saw earlier this year with <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/new-flash-player-zero-day-comes-inside-office-document\/\" target=\"_blank\" rel=\"noopener\">CVE-2018-4878<\/a> against South Korea.<\/p>\n<p>Victims open the booby-trapped document from a WinRAR archive that also contains a bogus jpeg file (shellcode) that will be used as part of the exploitation process that eventually loads a backdoor.<\/p>\n<div id=\"attachment_26528\" style=\"width: 964px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/CVE-2018-15982.gif\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26528\" data-permalink=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/12\/new-flash-player-zero-day-used-russian-facility\/attachment\/cve-2018-15982\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/CVE-2018-15982.gif\" data-orig-size=\"954,731\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"CVE-2018-15982\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/CVE-2018-15982-300x230.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/CVE-2018-15982-600x460.gif\" class=\"wp-image-26528 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/12\/CVE-2018-15982.gif\" alt=\"\" width=\"954\" height=\"731\" \/><\/a><\/p>\n<p class=\"wp-caption-text\">Zero-day attack flow stopped by <a href=\"https:\/\/www.malwarebytes.com\/business\/endpointprotectionandresponse\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a><\/p>\n<\/div>\n<p>As Qihoo 360 security researchers noted, the timing with this zero-day attack is close to a recent\u00a0<a href=\"https:\/\/www.theguardian.com\/world\/2018\/nov\/25\/russia-border-guards-ram-tugboat-ukraine-navy-crimea\" target=\"_blank\" rel=\"noopener\">real-world incident<\/a> between\u00a0Russia and Ukraine. Cyberattacks between the two countries have been going on for years and have affected major infrastructure, such as the <a href=\"https:\/\/en.wikipedia.org\/wiki\/December_2015_Ukraine_power_grid_cyberattack\" target=\"_blank\" rel=\"noopener\">power grid<\/a>.<\/p>\n<p>Malwarebytes users were already protected against this zero-day without the need to update any signatures. We detect the malware payload as\u00a0Trojan.CrisisHT.APT.<\/p>\n<p>Adobe has patched this vulnerability (security bulletin <a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb18-42.html\" target=\"_blank\" rel=\"noopener\">APSB18-42<\/a>) and it is highly recommended to apply this patch if you are still using Flash Player. Following the typical exploit-patch cycle, zero-days often become mainstream once other attackers get their hands on the code. For this reason, we can expect to see this exploit integrated into document exploit kits as well as web exploit kits in the near future.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/12\/new-flash-player-zero-day-used-russian-facility\/\">New Flash Player zero-day used against Russian facility<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/12\/new-flash-player-zero-day-used-russian-facility\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 05 Dec 2018 22:44:59 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/12\/new-flash-player-zero-day-used-russian-facility\/' title='New Flash Player zero-day used against Russian facility'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2015\/07\/Flash_Player_Banner.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>An APT group is using a new Flash Player zero-day that was used a lure targeting a Russian-based clinic<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/malwarebytes-news\/\" rel=\"category tag\">Malwarebytes news<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/0day\/\" rel=\"tag\">0day<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/adobe-flash\/\" rel=\"tag\">adobe flash<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit\/\" rel=\"tag\">exploit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/flash\/\" rel=\"tag\">flash<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/flash-activex\/\" rel=\"tag\">Flash ActiveX<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/flash-player\/\" rel=\"tag\">Flash Player<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/flash-player-zero-day\/\" rel=\"tag\">Flash Player zero-day<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/office\/\" rel=\"tag\">Office<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/russia\/\" rel=\"tag\">russia<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/russian\/\" rel=\"tag\">russian<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ukraine\/\" rel=\"tag\">ukraine<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/zero-day\/\" rel=\"tag\">zero day<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/12\/new-flash-player-zero-day-used-russian-facility\/' title='New Flash Player zero-day used against Russian facility'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/12\/new-flash-player-zero-day-used-russian-facility\/\">New Flash Player zero-day used against Russian facility<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[14741,12052,11638,11739,20368,11415,17394,10546,3245,251,14826,8642,11524],"class_list":["post-14007","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-0day","tag-adobe-flash","tag-exploit","tag-flash","tag-flash-activex","tag-flash-player","tag-flash-player-zero-day","tag-malwarebytes-news","tag-office","tag-russia","tag-russian","tag-ukraine","tag-zero-day"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14007"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14007\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}