Hackers are using a Flash flaw in fake document in this new spying campaign

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
The payload is delivered via phishing emails about a real defence conference - but nothing happens until the target scrolls down to the third page...

In these attacks, the Sofacy group are employing an updated version of DealersChoice, a platform designed to exploit a Flash vulnerability in order to stealthily deliver a malicious payload in the form of trojan malware.

The updated incarnation of DealersChoice contains a new evasion technique which researchers say hasn't been observed before - the Flash object only loads when a specific page of the malicious document used to do delivery the attack is viewed.

Attacks against the European government organisation - researchers haven't specified which country the target is in - start with spear-phishing emails with the subject of "Defence & Security 2018 Conference Agenda" which contain a Word document, titled "Defence & Security 2018 Conference Agenda.docx"
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top