21.11.2015 Views

dissection of a Cyber- Espionage attack

cct-w08_evolving-threats-dissection-of-a-cyber-espionage-attack

cct-w08_evolving-threats-dissection-of-a-cyber-espionage-attack

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The <strong>attack</strong> strategy<br />

How they break-in<br />

The <strong>attack</strong> started from a targeted spear-phish campaign against the participants <strong>of</strong><br />

the 2014 Farnborough Air Show.<br />

The <strong>attack</strong> has targeted 7 <strong>of</strong>ficials <strong>of</strong> Air Force (AM) and 2 <strong>of</strong>ficial <strong>of</strong> the Navy (MM)<br />

the email domain source was: “militaryexponews[.]com”<br />

The <strong>attack</strong> exploit a Micros<strong>of</strong>t Word vulnerability (CVE-2015-2424).<br />

Only in two cases the <strong>attack</strong> completes successfully for the <strong>attack</strong>er.<br />

In seven cases, the exploit, despite successfully detonated, was not able to start the<br />

infection because the machines lack direct Internet access (proxy blocked<br />

connection attempts).<br />

The reconstruction <strong>of</strong> the first stage has been performed after the creation <strong>of</strong> a<br />

proper set <strong>of</strong> IOCs starting from the infected systems.<br />

#RSAC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!