Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Russian-Based Hackers Use Two Zero-Day Exploits in One Attack

    Written by

    Sean Michael Kerner
    Published April 20, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Security firm FireEye issued a report on April 18 alleging that Operation RussianDoll made use of two zero-day flaws—one in Adobe Flash and the other in Microsoft Windows—in a targeted attack. FireEye has labeled the hacker group behind the attack as APT28, which is operating out of Russia and may have ties to the Russian government.

      “The target firm is a foreign government entity in an industry vertical that aligns with known APT28 targeting,” Darien Kindlund, director of threat intelligence at FireEye, told eWEEK. “We cannot be any more specific than that. We detected this attack in real time, reporting the attack to the victim accordingly.”

      FireEye’s APT28 RussianDoll attack report comes barely a week after the security firm released a report on a Chinese hacker group identified as APT30 that has been exploiting governments across Southeast Asia since 2005.

      The APT28 attack involved two vulnerabilities, both of which were zero-day issues that FireEye first discovered on April 13. One of the vulnerabilities, identified as CVE-2015-3043, is in Adobe Flash. Adobe actually patched the CVE-2015-3043 in an update released on April 14.

      Dan Caselden, senior malware researcher at FireEye, noted that the CVE-2015-3043 vulnerability was already on Adobe’s list of issues to fix prior to it being exploited by APT28 and discovered by FireEye on April 13.

      The second issue is CVE-2015-1701, a new privilege escalation flaw in Microsoft’s Windows operating system that has not yet been patched by Microsoft. In FireEye’s analysis, the Flash flaw was specifically paired with the Windows privilege escalation vulnerability in order to exploit the victim. That said, it is possible that CVE-2015-1701 could be used in other attacks.

      “It certainly could be used with other attack vectors,” Caselden told eWEEK. “As long as the attacker can run an exe [executable file] on the system, the attacker can exploit CVE-2015-1701 to get system privileges.”

      There is, however, a specific limitation with the CVE-2015-1701 vulnerability in the versions of Windows that are impacted. According to Microsoft, the vulnerability no longer exists in Windows 8 and later, Caselden said.

      Based on a number of factors, FireEye attributes the attack to APT28. Kindlund said the new exploit delivers a malware variant that shares characteristics with the APT28 backdoor CHOPSTICK and CORESHELL malware families.

      “The malware uses an RC4 encryption key that was previously used by the CHOPSTICK backdoor,” Kindlund said. “And the C2 [Command and Control] messages include a checksum algorithm that resembles those used in CHOPSTICK backdoor communications.”

      That fact that one hacker group decided to burn through two zero-days in one attack is not surprising to Caselden. Once an attacker gets code execution for Flash in Internet Explorer, they have limited privileges, he said. “Exploiting a privilege escalation is a natural next step to fully insert themselves into the system,” he said. “However, attackers often guard their privilege escalations closely.”

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.