HomeCyber BalkansNew Watering Hole Attack Utilizing Fake Adobe Flash Player Update To Disseminate...

New Watering Hole Attack Utilizing Fake Adobe Flash Player Update To Disseminate Malware

Published on

spot_img

In recent news, cybersecurity threats have been increasingly targeting vulnerabilities in publicly exposed assets such as VPNs and firewalls. Various actors, including APT groups and ransomware gangs, are exploiting these vulnerabilities. While the focus on these assets is understandable, it is crucial not to neglect traditional attack vectors like phishing emails, malicious websites, and social engineering, as they continue to be potent tools in the hands of attackers.

A notable incident in 2023 involved a watering hole attack on the website of a Japanese university research laboratory. This attack was likely aimed at researchers and students, highlighting the vulnerability of academic institutions to cyber threats. It also underscored the need for robust security measures to protect sensitive research data.

The attack leveraged a compromised website to deceive users into downloading a malicious Adobe Flash Player update. This update, disguised as legitimate software, was actually malware that infected the user’s system upon execution. Social engineering tactics were used to manipulate users into manually downloading and executing the malware, bypassing traditional vulnerability exploitation methods.

The malware, known as FlashUpdateInstall.exe, posed as a legitimate Adobe Flash Player update notification. Its main function was to install the core malware, system32.dll, which could potentially carry out malicious activities on the infected system. According to reports from JPCERT/CC, a modified system32.dll file, watermarked with 666666 by Cobalt Strike Beacon 4.5, was injected into the Explorer process using Early Bird Injection.

Furthermore, the attackers employed a sophisticated technique involving file name disguise, decoy documents, and customizable malware options such as stealth mode, anti-analysis disabling, document saving, process injection, and automated execution. Cloudflare Workers were leveraged for command and control (C2) operations in this watering hole attack, indicating a broader campaign by the group responsible.

The malware injected a DLL into processes to evade detection, terminated specific antivirus processes, and utilized anti-analysis techniques to check system resource usage and virtual machine environments. Suspected Cobalt Strike beacon configurations revealed communication with a server via HTTPS and port 443. Malicious code was injected through a downloaded JavaScript file, with dllhost.exe being used as a spawnto process. The configuration included user-agent spoofing and the retrieval of additional resources from the server.

In conclusion, the incident involving the Japanese university research laboratory serves as a stark reminder of the ongoing threats faced by academic institutions and the importance of implementing robust security measures. As cyber threats continue to evolve, it is essential for organizations to remain vigilant and address vulnerabilities across all attack vectors to protect against malicious activities.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...