7.8
CVSSv3

CVE-2017-0199

Published: 12/04/2017 Updated: 03/10/2019
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 958
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote malicious users to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2008 r2

microsoft windows server 2012 -

microsoft windows vista

microsoft windows server 2008

microsoft office 2010

microsoft office 2013

microsoft office 2016

microsoft windows 7

microsoft office 2007

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::FILEFORMAT include Msf::Exploit::Remote::HttpServer::HTML def initialize(info = {}) ...
Title: MS Office Excel (all versions) Arbitrary Code Execution Vulnerability Date: September 30th, 2017 Author: Eduardo Braun Prado Vendor Homepage: wwwmicrosoftcom/ Software Link: productsofficecom/ Version: 2007,2010,2013,2016 32/64 bits (x86 and x64) Tested on: Windows 10/81/80/7/Server 2012/Server 2008/Vista (X86 an ...
#!/usr/bin/env python ''' ## Exploit toolkit CVE-2017-0199 - v40 (githubcom/bhdresh/CVE-2017-0199) ## Download: githubcom/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41894zip ''' import os,sys,thread,socket,sys,getopt,binascii,shutil,tempfile from rand ...
This exploit leverages an MTA handler remote code execution vulnerability in Microsoft Word ...
Microsoft RTF CVE-2017-0199 proof of concept exploit ...
This Metasploit module creates a malicious RTF file that when opened in vulnerable versions of Microsoft Word will lead to code execution The flaw exists in how an olelink object can make a http(s) request, and execute hta code in response This bug was originally seen being exploited in the wild starting in Oct 2016 This Metasploit module was cr ...

Github Repositories

Proof of Concept exploit for CVE-2017-8570

What? This repo contains a Proof of Concept exploit for CVE-2017-8570, aka the "Composite Moniker" vulnerability This demonstrates using the Packagerdll trick to drop an sct file into the %TEMP% directory, and then execute it using the primitive that the vulnerability provides Why? A few reasons I wanted to see if it was possible to use the Packagerdll file-dr

sysmon-config | A Sysmon configuration file This is a forked and modified version of @SwiftOnSecurity's sysmon config It started as a is simply copy of the original repository We merged most of the 30+ open pull requests Thus we have fixed many of the issues that are still present in the original version and extended the coverage with important new extensions Maintaine

Phishing campaigns This repository contains papers on APT groups, which include examples of emails used in the phishing campaigns Often, papers on APT group attacks do not provide email examples, which prompted me to create a repository that specifically includes on papers containing phishing emails This list will be gradually expanded Contributions are welcome For reliabil

Cyber Apocalypse 2021 Testausserverifi writeup testausserverifi/ Web Extortion githubcom/evyatar9/Writeups/tree/master/CTFs/2021-CTF_HackTheBox/Cyber_Apocalypse_2021/Web-Extortion DaaS Hobbit ja Sanre Version: Laravel v8351 (PHP v7416) ip/api/user githubcom/ambionics/laravel-exploits githubcom/ambionics/phpggc Flag sijaitsee folde

RTF de-obfuscator for CVE-2017-0199 documents to find URLs statically.

RTF-Cleaner RTF de-obfuscator for CVE-2017-0199 documents to find URLs statically Use this tool to statically find URLs in obfuscated RTF documents Usage: \rtfCleanerUniversalps1 path-to-file Example: \rtfCleanerUniversalps1 'C:\Users\yams\Downloads\invoiceForYamsdoc' If the built in regexers don't find anything just enter what you find in the rtf file, IE

Exploit toolkit CVE-2017-0199 - v40 Exploit toolkit CVE-2017-0199 - v40 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration Disclaimer This program is for E

python-oletools oletools is a package of python tools to analyze Microsoft OLE2 files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office documents or Outlook messages, mainly for malware analysis, forensics and debugging It is based on the olefile parser See wwwdecalageinfo/python/oletools for m

URL-Parser Exploit(cve-2017-0199) url parser Document(doc) malware Requirements Windows Python 2 or 3 ver Usage python url_parserpy [sample folder path] ex) python url_parserpy test_sample Result

“小黄鸭”挖矿组织报告

起底“APT”挖矿组织——“小黄鸭”LemonDuck [TOC] 摘要 近期,我们监测到多起利用钓鱼邮件、漏洞利用传播,进行加密数字货币挖掘的蠕虫攻击活动。 经研究人员分析后将这一系列攻击活动定义为商业化APT行为,我们将这一系列活动背后的组织命名为“小黄鸭”。

CVE-2017-8570生成脚本(CVE-2017-0199另一种利用方式)

来源:wwwexploit-dbcom/exploits/44263/ 使用方法:python packager_composite_monikerpy -s calcsct -o examplertf What? This repo contains a Proof of Concept exploit for CVE-2017-8570, aka the "Composite Moniker" vulnerability This demonstrates using the Packagerdll trick to drop an sct file into the %TEMP% directory, and then execute it using the

Note No longer being updated, please refer to vincentyiucouk for red team tips :) Credits The following tips were posted by @vysecurity on Twitter Disclaimer The following information should not be used for malicious purposes or intent Red Team Tips by @vysecurity on Twitter Red Tip #1: Profile your victim and use their user agent to mask your traffic Alternatively u

Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter payload to victim without any complex configuration.

CVE-2017-0199 Exploit toolkit CVE-2017-0199 - v20 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE It could generate a malicious RTF file and deliver metasploit / meterpreter payload to victim without any complex configuration Release note: Introduced following capabilities to the script Generate Malicious RTF file using toolkit

Microsoft-Word-CVE-2017-0199- Description: Microsoft Word (CVE-2017-0199) is prone to a RCE trough a HTA Handler A remote code execution vulnerability exists in the way that Microsoft Office and WordPad parse specially crafted files An attacker who successfully exploited this vulnerability could take control of an affected system Impact: An attacker could exploit this vulner

NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements

CVE-2017-8759 This repo contains sample exploits for CVE-2017-8759 for Microsoft PowerPoint, along with a description of how similar vulnerabilities were, and can, be exploited using the same techniques Some background The aim of publishing this repo is to highlight alternative exploitation techniques that defenders may currently be unaware of By highlighting these alternativ

Quick and dirty fix to OLE2 executing code via .hta

CVE-2017-0199 Fix Remove CVE-2017-0199's ability to execute code by changing the default handler for hta files The default handler for files invoked through OLE2 (COM Objects) is stored separately from the local system's default application and can only be changed through the registry Basic Logic Exploit This is one practical example of this exploit, and is explain

Red Team Tips as posted by @vysecurity on Twitter

Note No longer being updated, please refer to vincentyiucouk for red team tips :) Credits The following tips were posted by @vysecurity on Twitter Disclaimer The following information should not be used for malicious purposes or intent Red Team Tips by @vysecurity on Twitter Red Tip #1: Profile your victim and use their user agent to mask your traffic Alternatively u

Rapid Deployment Infrastructure for Red Teaming and Penetration Testing

Kraken: Rapid Deployment Infrastructure for Red Teaming and Penetration Testing (aka: KrakenRDI) KrakenRDI is a project to easily deploy Docker containers with a full toolbox for RedTeaming and Penetration Testing Using KrakenRDI you don't need to waste time creating and setting up the environment for you and/or your team Using KrakenRDI there's more than 50 tools a

Red Team Tips as posted by @vysecurity on Twitter

Note No longer being updated, please refer to vincentyiucouk for red team tips :) Credits The following tips were posted by @vysecurity on Twitter Disclaimer The following information should not be used for malicious purposes or intent Red Team Tips by @vysecurity on Twitter Red Tip #1: Profile your victim and use their user agent to mask your traffic Alternatively u

Exploit toolkit for vulnerability RCE Microsoft RTF

PoC-CVE-2017-0199 Exploit toolkit for vulnerability RCE Microsoft RTF About this vulnerability: errorcybernewscom/2017/04/11/microsoft-word-zero-day/

cve-2017-0199 Sample file used in the wild twittercom/SyFi2k

An exploit implementation for RCE in RTF & DOCs (CVE-2017-0199)

htattackpy An exploit implementation for RCE in RTF docs (CVE-2017-0199) Video (in Spanish): wwwyoutubecom/watch?v=0lDvclMrymM Usage: python htattackpy -u <[attacker-url]/payloadexe>

URL-Parser Exploit(cve-2017-0199) url parser Document(doc) malware Requirements Windows Python 2 or 3 ver Usage python url_parserpy [sample folder path] ex) python url_parserpy test_sample Result

weaponry awesome projects blue team blue team,蓝队, 取证,Forensics notebook red-team,红队,红队笔记 Android android,安卓,reverse engine,逆向,AndroRAT web-shell webshell,web,打点,getshell, weevely red team framework red-team,红队,渗透框架,nishang,powershell,PowerSploit,PowerView privilege escalation tool privilege escalation,priv-esca,peas-ng,win

LinkedIn: https://www.linkedin.com/in/devmehedi101/ twitter : https://twitter.com/devmehedi101 Facebook page: https://www.facebook.com/devmehedi101

Red-Teaming-documentation List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting point Anyway, this is a living resources and will update regularly with latest Adversarial Tactics and Techniques You can help by sending Pull Requests to add more information MY other YouTube channel : ww

Awesome Red Teaming List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting point Anyway, this is a living resources and will update regularly with latest Adversarial Tactics and Techniques You can help by sending Pull Requests to add more information Table of Contents Social Engineering OSINT De

Exploit toolkit CVE-2017-0199 - v40 Exploit toolkit CVE-2017-0199 - v40 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration Disclaimer This program is for E

Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.

Exploit toolkit CVE-2017-0199 - v40 Exploit toolkit CVE-2017-0199 - v40 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration Disclaimer This program is for E

Exploit toolkit CVE-2017-0199 - v50 Exploit toolkit CVE-2017-0199 - v50 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration Disclaimer This program is for E

Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / any other payload to victim without any complex configuration.

Exploit toolkit CVE-2017-0199 - v20 Exploit toolkit CVE-2017-0199 - v20 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE It could generate a malicious RTF file and deliver metasploit / meterpreter payload to victim without any complex configuration Video tutorial youtube/42LjG7bAvpg Release note: Introduced following ca

Offline CVE Search utility.

cvesearch Offline CVE Search utility (Prereqs: pip3 install requests untangle) Usage: /cvesearchpy -h Display the help menu /cvesearchpy -c 2017-0199 Search by CVE number Search any part of the CVE (CVE-2017-0199, 2017-0199, or 0199) /cvesearchpy -s "Windows 2012 R2" Search all CVE descriptions by keyword Use quotations for multi-word search /cvesearchpy

CVE-2017-0199

CVE-2017-0199-master CVE-2017-0199

Exploit toolkit CVE-2017-0199 - v40 Exploit toolkit CVE-2017-0199 - v40 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration Disclaimer This program is for E

Log Source securitydatasetscom/notebooks/atomic/windows/introhtml ieeexploreieeeorg/abstract/document/9678773/references#references dlacmorg/doi/abs/101145/33389063338931 Günlük verilerinin istikrarsızlığı iki kaynaktan gelir: 1) günlük ifadelerinin evrimi ve 2) günlük verilerindeki işleme gürült&uum

Updated Repository for the Cyber Community Regarding Cyber Threats Affecting Israel

Iran - Israel Cyber Attacks A growing summery of Cyber Operations perpetrated by Iran against Israel 2017 April 19 - 24 The Iranian APT group OilRig (aka APT34) targeted around 250 individuals in various sectors like government, high-tech, healthcare, education, and more The attack was delivered using word documents exploiting CVE-2017-0199, through compromised email acco

RTF Cleaner, tries to extract URL from malicious RTF samples using CVE-2017-0199 & CVE-2017-8759

RTF-Cleaner RTF Cleaner, tries to extract URL from malicious RTF samples using CVE-2017-0199 & CVE-2017-8759

python-oletools oletools is a package of python tools to analyze Microsoft OLE2 files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office documents or Outlook messages, mainly for malware analysis, forensics and debugging It is based on the olefile parser See wwwdecalageinfo/python/oletools for m

tools

python-oletools oletools is a package of python tools to analyze Microsoft OLE2 files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office documents or Outlook messages, mainly for malware analysis, forensics and debugging It is based on the olefile parser See wwwdecalageinfo/python/oletools for m

python-oletools oletools is a package of python tools to analyze Microsoft OLE2 files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office documents or Outlook messages, mainly for malware analysis, forensics and debugging It is based on the olefile parser See wwwdecalageinfo/python/oletools for m

oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.

python-oletools oletools is a package of python tools to analyze Microsoft OLE2 files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office documents or Outlook messages, mainly for malware analysis, forensics and debugging It is based on the olefile parser See wwwdecalageinfo/python/oletools for m

A curated list of my GitHub stars!

Awesome Stars A curated list of my GitHub stars! Generated by starred Contents ai analytics android angular ansible api arduino artificial-intelligence automation awesome awesome-list aws azure bash blockchain c chatgpt chrome-extension cli code compiler cpp csharp css cybersecurity data data-analysis data-visualization database deep-learning devops discord django docker d

22 tools

python-oletools oletools is a package of python tools to analyze Microsoft OLE2 files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office documents or Outlook messages, mainly for malware analysis, forensics and debugging It is based on the olefile parser See wwwdecalageinfo/python/oletools for m

python-oletools oletools is a package of python tools to analyze Microsoft OLE2 files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office documents or Outlook messages, mainly for malware analysis, forensics and debugging It is based on the olefile parser See wwwdecalageinfo/python/oletools for m

Recent Articles

IT threat evolution Q3 2023
Securelist • David Emm • 01 Dec 2023

Targeted attacks Unknown threat actor targets power generator with DroxiDat and Cobalt Strike Earlier this year, we reported on a new variant of SystemBC called DroxiDat that was deployed against a critical infrastructure target in South Africa. This proxy-capable backdoor was deployed alongside Cobalt Strike beacons. The incident occurred in the third and fourth week of March, as part of a small wave of attacks involving both DroxiDat and Cobalt Strike beacons around the world; and we believe t...

IT threat evolution in Q3 2023. Non-mobile statistics
Securelist • AMR • 01 Dec 2023

These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q3 2023: Kaspersky solutions blocked 694,400,301 attacks from online resources across the globe. A total of 169,194,807 unique links were recognized as malicious by Web Anti-Virus components. Attempts to run malware for stealing money from online bank accounts were stopped on the com...

IT threat evolution in Q2 2023. Non-mobile statistics
Securelist • AMR • 30 Aug 2023

IT threat evolution in Q2 2023 IT threat evolution in Q2 2023. Non-mobile statistics IT threat evolution in Q2 2023. Mobile statistics These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q2 2023: Kaspersky solutions blocked 801,934,281 attacks from online resources across the globe. A total of 209,716,810 unique links were detected by Web ...

What’s happening in the world of crimeware: Emotet, DarkGate and LokiBot
Securelist • GReAT • 03 Aug 2023

Introduction The malware landscape keeps evolving. New families are born, while others disappear. Some families are short-lived, while others remain active for quite a long time. In order to follow this evolution, we rely both on samples that we detect and our monitoring efforts, which cover botnets and  underground forums. While doing so, we found new Emotet samples, a new loader dubbed “DarkGate”, and a new LokiBot infostealer campaign. We described all three in private reports, from ...

IT threat evolution in Q1 2023. Non-mobile statistics
Securelist • AMR • 07 Jun 2023

IT threat evolution in Q1 2023 IT threat evolution in Q1 2023. Non-mobile statistics IT threat evolution in Q1 2023. Mobile statistics These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q1 2023: Kaspersky solutions blocked 865,071,227 attacks launched from online resources across the globe. Web Anti-Virus detected 246,912,694 unique URLs ...

IT threat evolution in Q3 2022. Non-mobile statistics
Securelist • AMR • 18 Nov 2022

IT threat evolution in Q3 2022 IT threat evolution in Q3 2022. Non-mobile statistics IT threat evolution in Q3 2022. Mobile statistics These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q3 2022: Kaspersky solutions blocked 956,074,958 attacks from online resources across the globe. Web Anti-Virus recognized 251,288,987...

CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction
Securelist • AMR • 06 Jun 2022

At the end of May, researchers from the nao_sec team reported a new zero-day vulnerability in Microsoft Support Diagnostic Tool (MSDT) that can be exploited using Microsoft Office documents. It allowed attackers to remotely execute code on Windows systems, while the victim could not even open the document containing the exploit, or open it in Protected Mode. The vulnerability, which the researchers dubbed Follina, later received the identifier CVE-2022-30190. CVE-2022-30190 technical details Bri...

IT threat evolution Q3 2020. Non-mobile statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Oleg Kupreev Evgeny Lopatin Alexey Kulaev Alexander Kolesnikov • 20 Nov 2020

These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. According to Kaspersky Security Network, in Q3: In Q3 2020, Kaspersky solutions blocked attempts to launch one or more types of malware designed to steal money from bank accounts on the computers of 146,761 users. !function(e,i,n,s){var t="InfogramEmbeds",d=e.getElementsByTagName("script")[0];if(window[t]&&window[t].initialized)window[t].process&&w...

IT threat evolution Q2 2020. PC statistics
Securelist • Victor Chebyshev Evgeny Lopatin Fedor Sinitsyn Denis Parinov Oleg Kupreev Alexey Kulaev Alexander Kolesnikov • 03 Sep 2020

IT threat evolution Q2 2020. Review IT threat evolution Q2 2020. Mobile statistics These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. According to Kaspersky Security Network, in Q2: In Q2 2020, Kaspersky solutions blocked attempts to launch one or more types of malware designed to steal money from bank accounts on the computers of 181,725 users. !function(e,i,n,s){var t="InfogramEmbeds",d=e.getElementsByTagName("s...

US-CERT lists the 10 most-exploited security bugs and, yeah, it's mostly Microsoft holes people forgot to patch
The Register • Shaun Nichols in San Francisco • 14 May 2020

Update, update, update. Plus: Flash, Struts, Drupal also make appearances Sadly, 111 in this story isn't binary. It's decimal. It's the number of security fixes emitted by Microsoft this week

Vulnerabilities in Microsoft Windows, Office, and Windows Server, for which patches have been available for years, continue to be the favorite target for hackers looking to spread malware. A list posted by US-CERT this week rattles off the 10 most oft-targeted security vulnerabilities during the past three years, and finds that, shock horror, for the most part, keeping up with patching will keep you safe. Microsoft ranks highly in the list because its software is widely used, and provides the mo...

IT threat evolution Q3 2019. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Boris Larin Oleg Kupreev Evgeny Lopatin • 29 Nov 2019

These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. According to Kaspersky Security Network: In Q3 2019, we discovered an extremely unpleasant incident with the popular CamScanner app on Google Play. The new version of the app contained an ad library inside with the Trojan dropper Necro built in. Judging by the reviews on Google Play, the dropper’s task was to activate paid subscriptions, although it could delive...

RevengeHotels: cybercrime targeting hotel front desks worldwide
Securelist • GReAT • 28 Nov 2019

RevengeHotels is a targeted cybercrime malware campaign against hotels, hostels, hospitality and tourism companies, mainly, but not exclusively, located in Brazil. We have confirmed more than 20 hotels that are victims of the group, located in eight states in Brazil, but also in other countries such as Argentina, Bolivia, Chile, Costa Rica, France, Italy, Mexico, Portugal, Spain, Thailand and Turkey. The goal of the campaign is to capture credit card data from guests and travelers stored in hote...

IT threat evolution Q1 2019. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Boris Larin Oleg Kupreev Evgeny Lopatin • 23 May 2019

These statistics are based on detection verdicts of Kaspersky Lab products received from users who consented to provide statistical data. According to Kaspersky Security Network, Q1 2019 is remembered mainly for mobile financial threats. First, the operators of the Russia-targeting Asacub Trojan made several large-scale distribution attempts, reaching up to 13,000 unique users per day. The attacks used active bots to send malicious links to contacts in already infected smartphones. The mailings ...

IT threat evolution Q2 2018. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Alexander Liskin Oleg Kupreev • 06 Aug 2018

According to KSN: In Q2 2018, Kaspersky Lab detected 1,744,244 malicious installation packages, which is 421,666 packages more than in the previous quarter. Among all the threats detected in Q2 2018, the lion’s share belonged to potentially unwanted RiskTool apps (55.3%); compared to the previous quarter, their share rose by 6 p.p. Members of the RiskTool.AndroidOS.SMSreg family contributed most to this indicator. Second place was taken by Trojan-Dropper threats (13%), whose share fell by 7 p....

FBI boss: We went to the Moon, so why can't we have crypto backdoors? – and more this week
The Register • Iain Thomson in San Francisco • 28 Jul 2018

The good, the bad, and the ugly from infosec

Roundup There has been a bumper crop of security news this week, including another shipping giant getting taken down by ransomware, Russian hackers apparently completely pwning US power grids and a sane request from Senator Wyden (D-OR) for the US government to dump Flash. But there has been other news bubbling under. Useless action please! While Wyden might know what he's talking about his colleagues seem set on useless posturing. On Tuesday Senators Pat Toomey (R-PA) and Chris Van Hollen (D-MD...

IT threat evolution Q1 2018. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Alexander Liskin Oleg Kupreev • 14 May 2018

According to KSN: In Q1 2018, DNS-hijacking, a new in-the-wild method for spreading mobile malware on Android devices, was identified. As a result of hacked routers and modified DNS settings, users were redirected to IP addresses belonging to the cybercriminals, where they were prompted to download malware disguised, for example, as browser updates. That is how the Korean banking Trojan Wroba was distributed. It wasn’t a drive-by-download case, since the success of the attack largely depended ...

The King is dead. Long live the King!
Securelist • Vladislav Stolyarov Boris Larin Anton Ivanov • 09 May 2018

In late April 2018, a new zero-day vulnerability for Internet Explorer (IE) was found using our sandbox; more than two years since the last in the wild example (CVE-2016-0189). This particular vulnerability and subsequent exploit are interesting for many reasons. The following article will examine the core reasons behind the latest vulnerability, CVE-2018-8174. Our story begins on VirusTotal (VT), where someone uploaded an interesting exploit on April 18, 2018. This exploit was detected by sever...

North Korea's finest spent 2017 distributing RATs, wipers, and phish
The Register • Richard Chirgwin • 18 Jan 2018

And sent them mostly to South Korea, naturally

South Korea was the target of a barrage of malware campaigns last year. Cisco Talos's Warren Mercer and Paul Rascagneres (with contributions from Jungsoo An) spent the year watching goings-on on the Korean peninsula. The researchers focussed on one organisation (likely North Korean given the target, but this is unconfirmed), which they dub Group 123, and its continuing campaigns against the South. Remote Access Trojans – RATs – are Group 123's favourite approach, with three phishing campaign...

APT Trends report Q3 2017
Securelist • GReAT • 14 Nov 2017

Beginning in the second quarter of 2017, Kaspersky’s Global Research and Analysis Team (GReAT) began publishing summaries of the quarter’s private threat intelligence reports in an effort to make the public aware of what research we have been conducting.  This report serves as the next installment, focusing on important reports produced during Q3 of 2017. As stated last quarter, these reports will serve as a representative snapshot of what has been offered in greater detail in our private r...

IT threat evolution Q3 2017. Statistics
Securelist • Roman Unuchek Fedor Sinitsyn Denis Parinov Alexander Liskin • 10 Nov 2017

According to KSN data, Kaspersky Lab solutions detected and repelled 277,646,376 malicious attacks from online resources located in 185 countries all over the world. 72,012,219 unique URLs were recognized as malicious by web antivirus components. Attempted infections by malware that aims to steal money via online access to bank accounts were registered on 204,388 user computers. Crypto ransomware attacks were blocked on 186283 computers of unique users. Kaspersky Lab’s file antivirus detected ...

Gaza Cybergang – updated activity in 2017:
Securelist • Mohamad Amin Hasbini Ghareeb Saad • 30 Oct 2017

The Gaza cybergang is an Arabic-language, politically-motivated cybercriminal group, operating since 2012 and actively targeting the MENA (Middle East North Africa) region. The Gaza cybergang’s attacks have never slowed down and its typical targets include government entities/embassies, oil and gas, media/press, activists, politicians, and diplomats. One of the interesting new facts, uncovered in mid-2017, is its discovery inside an oil and gas organization in the MENA region, infiltrating sys...

IT threat evolution Q2 2017. Statistics
Securelist • Roman Unuchek Fedor Sinitsyn Denis Parinov Alexander Liskin • 15 Aug 2017

According to KSN data, Kaspersky Lab solutions detected and repelled 342, 566, 061 malicious attacks from online resources located in 191 countries all over the world. 33, 006, 783 unique URLs were recognized as malicious by web antivirus components. Attempted infections by malware that aims to steal money via online access to bank accounts were registered on 224, 675 user computers. Crypto ransomware attacks were blocked on 246, 675 computers of unique users. Kaspersky Lab’s file antivirus de...

Fresh Microsoft Office franken-exploit flops – and you should have patched by now anyway
The Register • John Leyden • 15 Aug 2017

Exploit combo fails to dodge Word warning prompts

Updated A booby-trapped .RTF file is doing the rounds that combines two publicly available Microsoft Office exploits. Opening the document in a vulnerable installation of Office is supposed to lead to arbitrary execution of any malicious code within the file. Cisco's security outfit Talos believes "the attackers used the combination to avoid Word displaying [an on-screen] prompt which may raise suspicions for the target end user. Another possibility is that they attempted to use this combination...

APT Trends report Q2 2017
Securelist • GReAT • 08 Aug 2017

Since 2014, Kaspersky Lab’s Global Research and Analysis Team (GReAT) has been providing threat intelligence reports to a wide-range of customers worldwide, leading to the delivery of a full and dedicated private reporting service. Prior to the new service offering, GReAT published research online for the general public in an effort to help combat the ever-increasing threat from nation-state and other advanced actors.  Since we began offering a threat intelligence service, all deep technical ...

Cowardly Microsoft buries critical Hyper-V, WordPad, Office, Outlook, etc security patches in normal fixes
The Register • Shaun Nichols in San Francisco • 11 Apr 2017

Patch Tuesday shakeup sucks

Microsoft today buried among minor bug fixes patches for critical security flaws that can be exploited by attackers to hijack vulnerable computers. In a massive shakeup of its monthly Patch Tuesday updates, the Windows giant has done away with its easy-to-understand lists of security fixes published on TechNet – and instead scattered details of changes across a new portal: Microsoft's Security Update Guide. Billed by Redmond as "the authoritative source of information on our security updates,"...

You patched yet? Years-old Microsoft security holes still hot targets for cyber-crooks
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources We're number one! We're number one! We're...

It's generally accepted that security flaws in Microsoft's products are a top magnet for crooks and fraudsters: its sprawling empire of hardware and software is a target-rich ecosystem in that there is a wide range of bugs to exploit, and a huge number of vulnerable organizations and users. And so we can believe it when Qualys yesterday said 15 of the 20 most-exploited software vulnerabilities it has observed are in Microsoft's code. These are the vulnerabilities abused by miscreants to infect v...