group behind Adobe Flash Zero-Day vulnerability:

FireEye said that North Korean group seems to behind Adobe Flash zero-day vulnerability

Must Read

Moving physical data center to cloud: Here’re key non-negotiables for cloud migration

Any journey from a physical data center to the cloud requires careful thought, education and investment in new capabilities to enable migration to the new environment.

Secure your information & data with password managers

There is a lot of personal or business information online. Secure their vulnerability using password managers, and conduct your business in safety

Here’s how live streaming is gaining ground in India

Live Streaming has made it quite easy to watch sports games in real time and that is why it is gaining ground in India
M Kalam
M Kalam
M Kalam covers technology and e-goverance for TechObserver.in.

Cybersecurity firm said that group seems to behind vulnerability which was highlighted by KISA (KrCERT) on January 31 and confirmed by Adobe on February 1. Unlike most other industry sources on this, FireEye is linking this Zero-day to North Korea. “We assess that the actors employing this latest Flash zero-day are a suspected North Korean group we track as TEMP.Reaper,” said cybersecurity firm.

“We believe the actors behind this latest Flash zero-day are a North Korean group we track as Reaper. We have high confidence that Reaper is a North Korean group as we have seen them mistakenly upload data to command and control server from North Korean IP space. The majority of their targeting has been South Korea focused, targeting the government, military, and defense industrial base as well as other industry. They have also taken an interest in predictable North Korean interests such as unification efforts and defectors,” said John Hultquist, Director of Intelligence Analysis, FireEye.

“This is one of the North Korean actors we have been concerned about with respect to the Olympics. They could be leveraged to gather information and possibly carry out attack. We have connected attacks to other North Korean actors, but we have not seen this actor engage in disruptive or destructive activity. Though we have not seen them execute it, we have seen these actors deploy wiper malware,” he added.

On Jan. 31, KISA (KrCERT) published an advisory about an Adobe Flash zero-day vulnerability being exploited in the wild. On Feb. 1, Adobe issued an advisory confirming the vulnerability exists in Adobe Flash Player 28.0.0.137 and earlier versions, and that successful exploitation could potentially allow an attacker to take control of the affected system.

FireEye wrote in a blog that they have observed TEMP.Reaper operators directly interacting with their command and control infrastructure from IP addresses assigned to the STAR-KP network in Pyozngyang. The STAR-KP network is operated as a joint venture between the North Korean Government’s Post and Telecommunications Corporation and Thailand-based Loxley Pacific. Historically, the majority of their targeting has been focused on the South Korean government, military, and defense industrial base; however, they have expanded to other international targets in the last year. They have taken interest in subject matter of direct importance to the Democratic People’s Republic of Korea (DPRK) such as Korean unification efforts and North Korean defectors.

FireEye said that analysis of the exploit chain is ongoing, but available information points to the Flash zero-day being distributed in a malicious document or spreadsheet with an embedded SWF file. Upon opening and successful exploitation, a decryption key for an encrypted embedded payload would be downloaded from compromised third party websites hosted in South Korea. Preliminary analysis indicates that the vulnerability was likely used to distribute the previously observed DOGCALL malware to South Korean victims.

Adobe stated that it plans to release a fix for this issue the week of Feb. 5, 2018. Until then, we recommended that customers use extreme caution, especially when visiting South Korean sites, and avoid opening suspicious documents, especially Excel spreadsheets. Due to the publication of the vulnerability prior to patch availability, it is likely that additional criminal and nation state groups will attempt to exploit the vulnerability in the near term.

- Advertisement -
- Advertisement -

Latest in TECH

Budget 2020 strengthens India’s commitment to IT sector: DG STPI Omkar Rai

According DG STPI Omkar Rai, the Finance Minister push of proactive policy measures on emerging technologies such as AI, ML, Data Analytics and Quantum Computing could be a a great catalyst for the Indian IT industry.
- Advertisement - ESDS eNight Cloud Hosting

Related Articles