The latest sample of puduch attacks still exploits the Flash Vulnerability of hackers

Source: Internet
Author: User
Tags cve

The latest sample of puduch attacks still exploits the Flash Vulnerability of hackers


Morphisec warned that an attack using the Hong Kong Telecom company's website began to use the latest Flash Vulnerability, which has been exploited by North Korea since middle November 2017.

South Korea's Internet and Security Agency (KISA) issued a warning that the CVE-2018-4878 vulnerability, said the vulnerability was exploited by hackers, Adobe within a week to fix the vulnerability.

Morphisec pointed out that the recent observed event was a textbook-style puduch attack. Attackers implant malware on a website that the victim may access.

Because the new attack method does not generate files or leave traces on the hard disk, it is more concealed. In addition, the custom protocol is used for ports that are not filtered.

Security researchers pointed out: "In general, this advanced pool attack is highly targeted in nature and should be supported by a very advanced organization ."

Concealed Enhancement

The Flash Vulnerability used in this attack is very similar to the vulnerability described in the previous CVE-2018-4878 vulnerability analysis, although they use different shellcode.

In the attack, shellcodeexecutes rundll32.exe and overwrites its memory with malicious code. The purpose of this malicious code is to directly download other code to the memory of the rundll32 process.

Security researchers also found that the command and control (C & C) server uses a custom protocol to communicate with the victim through port 443.

Additional code downloaded to rundll32 memory includes the Metasploit Meterpreter and Mimikatz modules. Most modules were compiled in February 15 and the attack started in less than a week.

Despite these advanced concealment features, This attack uses the basic Metasploit framework components that are compiled before the attack and are not obfuscated, making it difficult to trace the attack.

Morphisec said the attack targeted CVE-2018-4878 a few weeks ago, and the attack came from organizations with a national background, all of which gave rise to a feeling of familiarity.

* Reference: SecurityWeek

This article permanently updates link: https://www.bkjia.com/Linux/2018-03/151592.htm


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.