Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Criminals, Intelligence Agents Shared Zero-Day Microsoft Word Flaw

    Written by

    Robert Lemos
    Published April 14, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Intelligence operatives targeting Ukrainian rebels and cyber-criminals targeting businesses used the same zero-day attack exploiting a vulnerability in Microsoft Word, according to an analysis published by FireEye on April 12.

      Microsoft patched the issue earlier this week, but not before attackers had a chance to widely use the exploit to compromise systems and install malware. Security firms identified attacks as far back as November 2016 that used the exploit, with most firms pointing to the Dridex banking trojan as the major culprit.

      In its analysis, FireEye concluded—with what it characterized as “moderate confidence”—that the specific exploit code used by two groups — cyber-criminals spreading malware known as LatentBot and nation-state actors spreading a surveillance  program known as FinSpy — was the same.

      “Actors leveraging FINSPY and LATENTBOT used the zero-day as early as January and March, and similarities between their implementations suggest they obtained exploit code from a shared source,” researchers Ben Read and Jonathan Leathery wrote.

      The vulnerability exploited by the attacks, identified as CVE-2017-0199, allowed attackers to create a malicious documents that run a Visual Basic script to download malicious code to infect victims’ systems. To the user, the attack appears as if the document is updating content from other files, but in reality the document is retrieving a payload from the internet.

      Telltale artifacts in the code and documents used in the two attacks suggest a link, FireEye said.

      Cyber-spies had used the zero-day Word exploit to target pro-Ukrainian rebels with a surveillance tool known as FinSpy. In January 2017, a military training manual carrying the exploit targeted anti-Kyiv rebels in eastern Ukraine to deliver the cyber-espionage attack. FinSpy is a program produced by U.K.-based Gamma Group and sold to various national governments as a surveillance tool.

      Cyber-criminals used what appears to be the same exploit developed by the same source to target businesses and consumers. Six weeks after the FinSpy campaign appeared, criminal attackers began using the same exploit to spread LatentBot—malware that can steal credentials, remotely control computers and disable security software. FireEye has tracked that malware since December 2015 and has linked it to financially-motivated crime.

      Both campaigns used an exploit that shares the same ‘builder’ and revision times, suggesting that the code used in each attack came from the same source, the company’s analysis stated.

      While FireEye did not speculate as to the reason the same exploit may be being used by two separate groups, the most likely explanation for the link is that the same person sold the exploit to both Gamma Group and the cyber-criminals. Another possibility is that the intelligence operatives are either conducting criminal campaigns on the side or selling exploits to criminals. A third possibility is that Gamma, or one of its employee, sold the exploit to the criminals.

      The FireEye analysis noted that the use of the Word exploit by another botnet—Dridex—only happened after public reports of the vulnerability. On April 10, the attackers behind LatentBot started using the exploit to deliver a different payload, another piece of malware known as Terdot.

      “Though only one FINSPY user has been observed leveraging this zero-day exploit, the historic scope of FINSPY, a capability used by several nation states, suggests other customers had access to it,” FireEye wrote. “Additionally, this incident exposes the global nature of cyber-threats and the value of worldwide perspective—a cyber-espionage incident targeting Russians can provide an opportunity to learn about and interdict crime against English speakers elsewhere.”

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×