Adobe Flash Player Zero-Days Used by Hackers Linked to Russian Government

Source: National Cyber Security – Produced By Gregory Evans

Researchers from antivirus provider Trend Micro said in a blog post published on Tuesday that the attackers behind Pawn Storm are using a new Adobe Flash zero-day exploit in their latest campaign. TrendMicro has been monitoring the campaign for a few time. Several Ministries of Foreign Affairs have been attacked using the leak. Those emails contain links to websites hosting the exploit, and so when a user with flash installed clicks on the link, the malware is installed on their computer. The phishing mails have subjects such as “Suicide vehicle bomb targets North Atlantic Treaty Organisation troop convoy Kabul”, “Syrian troops make gains as Putin defends airstrikes”, “Israel launches airstrikes on targets in Gaza”, “Russia warns of response to reported USA nuke buildup in Turkey, Europe” and “US military reports 75 US-trained rebels return Syria”. “Foreign affairs ministries have become a particular focus of interest for Pawn Storm recently”, added the firm. Besides malware attacks, fake Outlook Web Access (OWA) servers were also established for various ministries, which are used for simple, but very effective, credential phishing attacks. Trend Micro suggests that one ministry found that its DNS settings for incoming email had been compromised as a result. The CVE-2015-5569 […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Adobe Flash Player Zero-Days Used by Hackers Linked to Russian Government appeared first on National Cyber Security.

View full post on National Cyber Security