Featured Articles

Analyst reveals Apple Watch spec

Analyst reveals Apple Watch spec

An analyst has examined the Apple Watch supply chain in an effort to ascertain the exact spec of Cupertino’s new gadget…

More...
Nvidia's first 20nm product is a mobile SoC

Nvidia's first 20nm product is a mobile SoC

For much of the year we were under the impression that the second generation Maxwell will end up as a 20nm…

More...
Nvidia GTX 980 reviewed

Nvidia GTX 980 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Nvidia adjusts GTX 980 and GTX 970 pricing

Nvidia adjusts GTX 980 and GTX 970 pricing

It appears that Nvidia has been feeling the pulse of the market and took some note from comments regarding the original…

More...
PowerColor TurboDuo R9 285 reviewed

PowerColor TurboDuo R9 285 reviewed

Today we will take a look at the PowerColor TurboDuo Radeon R9 285. The card is based on AMD’s new…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Thursday, 07 November 2013 12:26

Office zero day exploited by two groups

Written by Nick Farrell



Graphics component in Word docs

A zero-day vulnerability, which was discovered that exploits a Microsoft graphics component using malicious Word documents, appears to be attacking Indian and Pakistan targets.

FireEye’s Research team has analysed this zero-day exploit and found a connection between these attacks and earlier attacks in India and Pakistan. Information obtained from a command-and-control server (CnC) used in recent attacks indicateds that the Hangover group, believed to operate from India, has compromised 78 computers, 47 percent of those in Pakistan.

FireEye has also found that another group also has access to this exploit and is using it to deliver the Citadel Trojan malware. This group, which we call the Arx group, may have had access to the exploit before the Hangover group did. Information obtained from CnCs operated by the Ark group revealed that 619 targets have been compromised. The majority of the targets are in India (63 percent) and Pakistan (19 percent).

This seems to indicate that use of this zero-day exploit is more widespread than previously believed and two different groups are using this exploit: Hangover and Ark. Hangover has been previously connected with a targeted malware campaign, and the Ark group is operating a Citadel-based botnet for organised crime.

Nick Farrell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments