- Jul 22, 2014
- 2,525
A cyber-espionage group identified in the cyber-security industry as APT28 and believed to be operating under the supervision of the Russian state has recently dispatched several malware distribution campaigns that try to take advantage of a Flash zero-day vulnerability that Adobe patched earlier this week.
It is clear that APT28 is trying to exploit the CVE-2017-11292 zero-day before the vast majority of users receive patches or update their systems.
According to US cyber-security firm Proofpoint, the one which first spotted these attacks, APT28 targeted a broad set of targets across Europe and in the US.
Current data on the email spear-phishing campaign suggests the group targeted state departments and private-sector businesses in the aerospace industry.
Group was sloppy in recent campaign
....
It is clear that APT28 is trying to exploit the CVE-2017-11292 zero-day before the vast majority of users receive patches or update their systems.
According to US cyber-security firm Proofpoint, the one which first spotted these attacks, APT28 targeted a broad set of targets across Europe and in the US.
Current data on the email spear-phishing campaign suggests the group targeted state departments and private-sector businesses in the aerospace industry.
Group was sloppy in recent campaign
....