Aerospace and defense firms targeted with clever spear phishing
Posted on 31.01.2013
Directors, vice presidents and other top management of companies in the aerospace industry and U.S. government and defense contractors have recently been targeted with a highly believable spear phishing campaign (click on the screenshot to enlarge it):

According to Symantec researchers, the content of all the sent out emails was the same, and the attackers aimed at making it seem as though the email originally came from the company that authored the report, then forwarded by employees.

Once downloaded and run, the attached malicious PDF file attempts to exploit a Adobe Flash Player vulnerability, and if it succeeds, it drops a malicious version of the svchost.exe file into the computer. The PDF also opens itself so that the targets don't become suspicious.

The executable then drops a malicious version of the ntshrui.dll file into the Windows directory, and makes explorer.exe run it.

It all ends with the victims having a permanent backdoor opened on their computer, and it contacts its C&C server (from which it gets further updates), enumerates disk drives, steals system information and forwards it all to the C&C server. Judging by this, this espionage campaign is currently in the reconnaissance phase.

"Organizations should ensure proper email security is in place and also make patch management a priority, as the vulnerability exploited here was patched in 2011," the researchers point out.


The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Mon, Sep 1st