Aerospace and defense firms targeted with clever spear phishing
Posted on 31.01.2013
Directors, vice presidents and other top management of companies in the aerospace industry and U.S. government and defense contractors have recently been targeted with a highly believable spear phishing campaign (click on the screenshot to enlarge it):

According to Symantec researchers, the content of all the sent out emails was the same, and the attackers aimed at making it seem as though the email originally came from the company that authored the report, then forwarded by employees.

Once downloaded and run, the attached malicious PDF file attempts to exploit a Adobe Flash Player vulnerability, and if it succeeds, it drops a malicious version of the svchost.exe file into the computer. The PDF also opens itself so that the targets don't become suspicious.

The executable then drops a malicious version of the ntshrui.dll file into the Windows directory, and makes explorer.exe run it.

It all ends with the victims having a permanent backdoor opened on their computer, and it contacts its C&C server (from which it gets further updates), enumerates disk drives, steals system information and forwards it all to the C&C server. Judging by this, this espionage campaign is currently in the reconnaissance phase.

"Organizations should ensure proper email security is in place and also make patch management a priority, as the vulnerability exploited here was patched in 2011," the researchers point out.


Biggest ever cyber security exercise in Europe is underway

Posted on 30 October 2014.  |  More than 200 organisations and 400 cyber-security professionals from 29 European countries are testing their readiness to counter cyber-attacks in a day-long simulation, organised by the European Network and Information Security Agency (ENISA).

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Thu, Oct 30th