A recently patched Flash Player flaw was exploited in a widespread attack spam campaign primarily targeting South Koreans.
The vulnerability was first spotted in the wild as part of a different malspam campaign in late January 2018 by the South Korean Computer Emergency Response Team (KR-CERT), in attacks launched by the North Korean threat group APT 37, also known as Group 123, according to a Feb. 4
Security Boulevard blog post.
Researchers from the Hauri security firm, however believe the exploit has been in use since November 2017. The vulnerability could lead to remote code execution in Adobe Flash Player 28.0.0.137 and earlier versions and potentially allow an attacker to take control of the affected system. The flaw was patched in a Feb. 6 Adobe System
update.
The vulnerability was most recently spotted in a new campaign with changes made to bypass traditional static detection systems that already had signatures for the original exploit.
“Researchers from security firm Morphisec now report that they've seen CVE-2018-4878 being exploited in a massive malspam campaign that distributes shortened URLs pointing to malicious Word documents,” researcher said in the blog. “The documents embed the exploit code for the Flash Player vulnerability, which, if executed, will launch cmd.exe and will download an additional payload from a remote server.”