Products
Applications
Support
Company
How To Buy
Skip to main content (Press Enter).
Sign in
Skip auxiliary navigation (Press Enter).
Register
Skip main navigation (Press Enter).
Toggle navigation
Search Options
Home
My Communities
Communities
All Communities
Application Networking and Security
Enterprise Software
Mainframe Software
Software Defined Edge
Symantec Enterprise
Tanzu
VMware {code}
VMware Cloud Foundation
Blogs
All Blogs
Enterprise Software
Mainframe Software
Symantec Enterprise
VMware
Events
All Events
Enterprise Software
Mainframe Software
Symantec Enterprise
VMware
Water Cooler
Betas
Flings
Education
Groups
Enterprise Software
Mainframe Software
Symantec Enterprise
VMware
Members
Endpoint Protection
View Only
Community Home
Threads
Library
Events
Members
Back to Library
New Zero-Day Vulnerability Used in Operation Hangover Attacks
1
Recommend
Nov 06, 2013 10:13 AM
A L Johnson
On November 5, Microsoft issued an
advisory
and a
blog post
to report a new zero-day vulnerability in the Microsoft Graphics component that affects Windows, Microsoft Office and Microsoft Lync: the
Multiple Microsoft Products Remote Code Execution Vulnerability (CVE-2013-3906)
. The advisory states that the vulnerability exists in the way that certain components handle specially crafted TIFF images, potentially allowing an attacker to remotely execute code on the affected computer.
While Microsoft has yet to release a patch for this vulnerability, it has provided a temporary "
Fix It
” tool as a workaround until a security update is made available. To ensure that Symantec customers are protected from attacks using this zero-day vulnerability, the following protection is being released:
Antivirus
Trojan.Hantiff
Bloodhound.Exploit.525
Intrusion Prevention System
Web Attack: Microsoft Office RCE CVE-2013-3906_2
The Microsoft blog post states that this vulnerability is being actively exploited in targeted attacks using crafted Word documents sent in emails. Symantec’s research into the exploitation of this zero-day flaw in the wild has shown that our
Symantec.Cloud
service preemptively blocks emails sent as part of this attack. Here are some examples of the email subject headings and the attached files’ names seen in the attack:
File name:
Details_Letter of Credit.doc
Email subject:
Illegal Authorization for Funds Transfer
File name:
Missing MT103 Confirmation.docx
Email subject:
Problem with Credit September 26th 2013
File name:
Illegality_Supply details.docx
Email subject:
Illegal Authorization for Funds Transfer
After analyzing the payloads being used in this attack, we have identified that the targeted emails are part of an attack campaign known as Operation Hangover, which we covered back in May 2013 in the blog post:
Operation Hangover: Q&A on Attacks
. At that time, the group behind these attacks was known to have used multiple vulnerabilities, but was not known to have used any zero-day flaws in the attacks. As predicted in our previous blog post, the exposure of Operation Hangover would not adversely affect the activities of the group orchestrating the campaign, which can be clearly seen now with these latest activities involving the zero-day vulnerability.
Symantec has protection in place for the threats used in this latest wave of the Operation Hangover campaign as
Trojan.Mdropper
,
Downloader
and
Infostealer
. To allow customers to identify this attack, we are mapping the latest components of the Operation Hangover campaign to
Trojan.Smackdown.B
and
Trojan.Hangove.B
.
Symantec will continue to investigate this attack to ensure that the best possible protection is in place. As always, we recommend that users keep their systems up-to-date with the latest software patches and refrain from opening any suspicious emails. We also advise customers to use the latest
Symantec technologies
and incorporate the latest Symantec consumer and enterprise solutions to best protect against attacks of this kind.
Statistics
0 Favorited
2 Views
0 Files
0 Shares
0 Downloads
Tags and Keywords
Related Entries and Links
No Related Resource entered.
Copyright 2019. All rights reserved.
Powered by Higher Logic