id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
611 | Globalizing the Attacks Figure 3 below is a map showing where our Unit 42 researchers have found webistes involved in Hancitor attacks. | [
{
"id": 46204,
"label": "malware",
"start_offset": 120,
"end_offset": 128
},
{
"id": 46205,
"label": "identity",
"start_offset": 68,
"end_offset": 87
}
] | [] | [] |
612 | Figure 3: Hancitor distribution servers globally thus far in 2017 Table 1 – Number of Distribution Servers by Country | [
{
"id": 44799,
"label": "malware",
"start_offset": 11,
"end_offset": 19
},
{
"id": 44800,
"label": "TIME",
"start_offset": 62,
"end_offset": 66
}
] | [] | [] |
613 | The hot spots in the United States represents distribution servers which are created using fraud based accounts at various hosting providers that are hosting the Hancitor documents while the hotspots in Asia represent legitimate sites for small and medium businesses that have been compromised by the actors behind Hancitor campaign to host the malicious Hancitor documents. | [
{
"id": 46207,
"label": "malware",
"start_offset": 162,
"end_offset": 170
},
{
"id": 46208,
"label": "location",
"start_offset": 203,
"end_offset": 207
},
{
"id": 46206,
"label": "location",
"start_offset": 21,
"end_offset": 34
},
{
"id": 46210,
"label": "campaign",
"start_offset": 315,
"end_offset": 332
},
{
"id": 46211,
"label": "malware",
"start_offset": 355,
"end_offset": 363
}
] | [
{
"id": 168,
"from_id": 46207,
"to_id": 46206,
"type": "targets"
},
{
"id": 169,
"from_id": 46207,
"to_id": 46208,
"type": "targets"
}
] | [] |
614 | Conclusion Attackers are always making business decisions to optimize their attacks in ways that are most successful and profitable. | [] | [] | [] |
615 | What is most interesting about Hancitor is the way these decisions so clearly reflect an awareness of business realities (by targeting peak working times) and dividing up the “work” of their attacks in a way that so clearly mirrors mainstream business decisions around globalizing operations. | [
{
"id": 45796,
"label": "malware",
"start_offset": 31,
"end_offset": 39
}
] | [] | [] |
616 | In the end, while Hancitor may not be sophisticated, these steps to adapt and stay effective seem to be succeeding. | [
{
"id": 46212,
"label": "malware",
"start_offset": 19,
"end_offset": 27
}
] | [] | [] |
617 | And we expect to continue to see Hancitor be a global threat for the foreseeable future. | [
{
"id": 46213,
"label": "malware",
"start_offset": 33,
"end_offset": 41
}
] | [] | [] |
618 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
619 | Please mark, I'm not a robot! | [] | [] | [] |
620 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
621 | This post is also available in: 日本語 (Japanese) This Unit 42 blog provides an update on the threat situation surrounding attacks using the Petya Ransomware which are impacting organizations in Ukraine, Russia and to a lesser extent around the world. | [
{
"id": 2073,
"label": "identity",
"start_offset": 58,
"end_offset": 65
},
{
"id": 2074,
"label": "malware",
"start_offset": 144,
"end_offset": 149
},
{
"id": 44803,
"label": "malware",
"start_offset": 144,
"end_offset": 160
},
{
"id": 44804,
"label": "location",
"start_offset": 198,
"end_offset": 205
},
{
"id": 44805,
"label": "location",
"start_offset": 207,
"end_offset": 213
}
] | [
{
"id": 27,
"from_id": 44803,
"to_id": 44805,
"type": "targets"
},
{
"id": 26,
"from_id": 44803,
"to_id": 44804,
"type": "targets"
}
] | [] |
622 | On June 27th, 2017 we became aware of a new variant of the Petya malware which is spreading through multiple lateral movement techniques. | [
{
"id": 2081,
"label": "malware",
"start_offset": 60,
"end_offset": 65
},
{
"id": 46214,
"label": "TIME",
"start_offset": 4,
"end_offset": 19
}
] | [] | [] |
623 | One technique includes the ETERNALBLUE exploit tool. | [
{
"id": 2083,
"label": "malware",
"start_offset": 28,
"end_offset": 39
}
] | [] | [] |
624 | This is the same exploit the WanaCrypt0r/WannaCry malware exploited to spread globally in May, 2017. | [
{
"id": 2086,
"label": "malware",
"start_offset": 29,
"end_offset": 40
},
{
"id": 2087,
"label": "malware",
"start_offset": 41,
"end_offset": 49
},
{
"id": 44808,
"label": "TIME",
"start_offset": 90,
"end_offset": 99
}
] | [] | [] |
625 | At least 50 organizations have reported impacts from the malware, including government and critical infrastructure operators. | [] | [] | [] |
627 | Palo Alto Networks is documenting our prevention capabilities with regard to this threat in the Palo Alto Networks Protections for Petya Ransomware blog post. | [
{
"id": 44809,
"label": "identity",
"start_offset": 1,
"end_offset": 19
},
{
"id": 44810,
"label": "identity",
"start_offset": 97,
"end_offset": 115
},
{
"id": 44811,
"label": "malware",
"start_offset": 132,
"end_offset": 148
}
] | [] | [] |
628 | Windows users should take the following general steps to protect themselves: | [
{
"id": 46217,
"label": "SOFTWARE",
"start_offset": 0,
"end_offset": 7
}
] | [] | [] |
629 | This is a developing situation, we will update this blog as new information becomes available. | [] | [] | [] |
630 | AutoFocus users view samples using the Petya tag. | [
{
"id": 2102,
"label": "malware",
"start_offset": 39,
"end_offset": 44
}
] | [] | [] |
631 | Petya is a ransomware family that works by modifying the Window’s system’s Master Boot Record (MBR), causing the system to crash. | [
{
"id": 2103,
"label": "malware",
"start_offset": 1,
"end_offset": 6
},
{
"id": 46218,
"label": "SOFTWARE",
"start_offset": 58,
"end_offset": 100
}
] | [] | [] |
632 | When the user reboots their PC, the modified MBR prevents Windows from loading and displays a fake “chkdisk” screen which indicates the computer's hard drive is being repaired, but the malware is actually encrypting the user's files. | [
{
"id": 46220,
"label": "SOFTWARE",
"start_offset": 58,
"end_offset": 65
},
{
"id": 46219,
"label": "SOFTWARE",
"start_offset": 45,
"end_offset": 48
}
] | [] | [] |
633 | When this process completes, the malware displays an ASCII Ransom note demanding payment from the victim (Figure 1). Figure 1: Latest Petya Ransom note displayed on a compromised system. | [
{
"id": 2109,
"label": "malware",
"start_offset": 136,
"end_offset": 141
}
] | [] | [] |
634 | The latest version of the Petya ransomware is spreading over Windows SMB and is reportedly using the ETERNALBLUE exploit tool, which exploits CVE-2017-0144 and was originally released by the Shadow Brokers group in April 2017. | [
{
"id": 2111,
"label": "malware",
"start_offset": 27,
"end_offset": 32
},
{
"id": 2113,
"label": "malware",
"start_offset": 102,
"end_offset": 113
},
{
"id": 2116,
"label": "threat-actor",
"start_offset": 188,
"end_offset": 206
},
{
"id": 46221,
"label": "SOFTWARE",
"start_offset": 62,
"end_offset": 73
},
{
"id": 46222,
"label": "vulnerability",
"start_offset": 143,
"end_offset": 156
},
{
"id": 46223,
"label": "TIME",
"start_offset": 216,
"end_offset": 226
}
] | [
{
"id": 171,
"from_id": 2111,
"to_id": 46222,
"type": "exploits"
},
{
"id": 170,
"from_id": 2111,
"to_id": 46221,
"type": "targets"
},
{
"id": 172,
"from_id": 2116,
"to_id": 2113,
"type": "authored-by"
},
{
"id": 173,
"from_id": 46222,
"to_id": 46221,
"type": "targets"
}
] | [] |
635 | After the system is compromised the victim is asked to send US $300 in Bitcoin to a specific Bitcoin address and then send an e-mail with the victim’s bitcoin wallet ID to wowsmith123456@posteo[.]net to retrieve their individual decryption key. | [
{
"id": 46226,
"label": "SOFTWARE",
"start_offset": 94,
"end_offset": 101
},
{
"id": 46224,
"label": "EMAIL",
"start_offset": 173,
"end_offset": 200
},
{
"id": 46225,
"label": "SOFTWARE",
"start_offset": 72,
"end_offset": 79
}
] | [] | [] |
636 | Posteo (a free e-mail provider) has already shut down this e-mail address, and as such victims should not even attempt to pay the ransom. | [
{
"id": 44816,
"label": "SOFTWARE",
"start_offset": 1,
"end_offset": 7
}
] | [] | [] |
637 | As of 13:00 UTC on June 28thth, approximately 4 Bitcoin have been transferred to the attacker's wallet. | [
{
"id": 46227,
"label": "TIME",
"start_offset": 6,
"end_offset": 28
}
] | [] | [] |
638 | Unit 42 is unaware of ANY successful recovery after paying the ransom. | [
{
"id": 2124,
"label": "identity",
"start_offset": 1,
"end_offset": 8
},
{
"id": 2125,
"label": "location",
"start_offset": 64,
"end_offset": 70
}
] | [] | [] |
639 | Additionally, ongoing research by the industry is showing that specific actions this malware takes makes it technically infeasible, if not impossible, for recovery to occur. | [] | [] | [] |
640 | This means that even though this malware is functionally ransomware, for threat assessment purposes, it should be functionally considered a “wiper”. | [] | [] | [] |
641 | We are aware of the following information about how the Petya attack lifecycle works. | [
{
"id": 46228,
"label": "malware",
"start_offset": 57,
"end_offset": 62
}
] | [] | [] |
642 | Delivery/Exploitation | [] | [] | [] |
643 | We have not yet confirmed the initial infection vector for this new Petya variant. | [
{
"id": 2132,
"label": "malware",
"start_offset": 69,
"end_offset": 74
}
] | [] | [] |
644 | Previous variants were spread through e-mail, but we have not identified this latest sample carried in any e-mail related attacks. | [] | [] | [] |
645 | While we have not been able to directly confirm the source, we have seen evidence that a Ukrainian software application called MEDoc was used by attackers to deliver the Petya DLL. | [
{
"id": 46229,
"label": "location",
"start_offset": 90,
"end_offset": 99
},
{
"id": 44817,
"label": "SOFTWARE",
"start_offset": 128,
"end_offset": 133
},
{
"id": 44818,
"label": "malware",
"start_offset": 171,
"end_offset": 176
}
] | [
{
"id": 174,
"from_id": 44818,
"to_id": 44817,
"type": "uses"
}
] | [] |
646 | The software is heavily used in Ukraine it appears the company’s systems may have been compromised and used to issue a malicious update to systems running the program on the morning of Jun 27th. | [
{
"id": 46230,
"label": "TIME",
"start_offset": 174,
"end_offset": 193
},
{
"id": 46231,
"label": "location",
"start_offset": 32,
"end_offset": 39
}
] | [] | [] |
648 | Installation | [] | [] | [] |
649 | This variant of Petya is spread as a DLL file, which must be executed by another process before it takes action on the system. | [
{
"id": 2145,
"label": "malware",
"start_offset": 16,
"end_offset": 21
}
] | [] | [] |
650 | Once executed, it overwrites the Master Boot Record and creates a scheduled task to reboot the system. | [
{
"id": 46233,
"label": "SOFTWARE",
"start_offset": 33,
"end_offset": 51
},
{
"id": 46234,
"label": "attack-pattern",
"start_offset": 66,
"end_offset": 80
}
] | [] | [] |
651 | Once the system reboots, the malware displays a fake “chkdisk” scan which tricks the victim into believing the program is repairing their hard drive. | [] | [] | [] |
652 | In reality, the malware is encrypting the NTFS Master File Table in the background. | [] | [] | [] |
653 | Once the fake chkdisk completes, the malware displays a ransom note which demands a payment of $300 in bitcoin. | [] | [] | [] |
654 | Command and Control Petya contains no Command and Control mechanisms that we know of. | [
{
"id": 2153,
"label": "malware",
"start_offset": 21,
"end_offset": 26
}
] | [] | [] |
655 | After a host is infected, there is no communication from the malware back to the attacker. | [] | [] | [] |
656 | Lateral Movement Petya uses three mechanisms to spread to additional hosts. | [
{
"id": 2156,
"label": "malware",
"start_offset": 19,
"end_offset": 24
},
{
"id": 46235,
"label": "attack-pattern",
"start_offset": 1,
"end_offset": 17
}
] | [] | [] |
657 | Ransomware attacks are very common, but they are rarely coupled with an exploit that allows the malware to spread as a network worm. | [] | [] | [] |
658 | The WannaCry attacks in May, 2017 demonstrated that many Windows systems had not been patched for this vulnerability. | [
{
"id": 2160,
"label": "malware",
"start_offset": 4,
"end_offset": 12
},
{
"id": 46236,
"label": "TIME",
"start_offset": 24,
"end_offset": 33
},
{
"id": 46237,
"label": "SOFTWARE",
"start_offset": 57,
"end_offset": 64
}
] | [] | [] |
659 | The spread of Petya using this vulnerability indicates that many organizations may still be vulnerable, despite the attention WannaCry received. | [
{
"id": 2163,
"label": "malware",
"start_offset": 14,
"end_offset": 19
},
{
"id": 2166,
"label": "malware",
"start_offset": 126,
"end_offset": 134
}
] | [] | [] |
660 | As always if you have any questions, please come to the Threat & Vulnerability Discussions on our Live Community. Version Summary June 27, 2017: June 27, 2017 – 1:08 PM PT June 28, 2017 – 8:40 AM PT June 29, 2017 - 5:00 PM PT Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [
{
"id": 46238,
"label": "TIME",
"start_offset": 133,
"end_offset": 146
},
{
"id": 46241,
"label": "TIME",
"start_offset": 177,
"end_offset": 203
},
{
"id": 46242,
"label": "TIME",
"start_offset": 205,
"end_offset": 231
},
{
"id": 46240,
"label": "TIME",
"start_offset": 149,
"end_offset": 175
}
] | [] | [] |
661 | Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
662 | Nearly all of us have a use for Microsoft Office documents. | [
{
"id": 46243,
"label": "SOFTWARE",
"start_offset": 32,
"end_offset": 48
}
] | [] | [] |
663 | Whether they are work documents, e-receipts, or a lease on a new apartment – Office documents are useful to all of us, and this is part of the reason we’re very likely to open an office document we receive as an attachment in e-mail. | [] | [] | [] |
664 | Armed with the knowledge that many people will open nearly any document, even those from an untrusted source, adversaries commonly choose these files in attacks to compromise a system. | [] | [] | [] |
665 | In this threat brief we show you five different ways that Office documents can be subverted and abused to attack and compromise a Windows endpoint, some we’ve already posted about before, and some are new. | [
{
"id": 46244,
"label": "SOFTWARE",
"start_offset": 130,
"end_offset": 137
}
] | [] | [] |
666 | Macros Macros are the most straight-forward way for an attacker to weaponize Office documents. | [] | [] | [] |
667 | Office applications have a built-in script engine that can run VBA (Visual Basic for Applications) scripts. | [
{
"id": 46245,
"label": "SOFTWARE",
"start_offset": 63,
"end_offset": 98
}
] | [] | [] |
668 | These scripts can execute immediately as the document opens, without any user interaction (assuming the user has previously enabled macros) and run malicious code on the system. | [] | [] | [] |
669 | If the user has not enabled macros, a popup window will appear asking the user to click to do so. | [] | [] | [] |
670 | The pop-up is one of several security mechanisms added by Microsoft to mitigate the security risk that macros pose. | [
{
"id": 46246,
"label": "identity",
"start_offset": 58,
"end_offset": 67
}
] | [] | [] |
671 | Microsoft will also force a different file extension (.docm instead of .docx for new documents containing macros). | [
{
"id": 46247,
"label": "identity",
"start_offset": 0,
"end_offset": 9
}
] | [] | [] |
672 | Despite these measures, users still choose to open these files and enable their content, thus allowing macros to continue be a common attack vector – both in wide and simple attacks to deliver ransomware such as Emotet, as well as for sophisticated attacks like this Sofacy campaign. | [
{
"id": 2220,
"label": "malware",
"start_offset": 212,
"end_offset": 218
},
{
"id": 44819,
"label": "campaign",
"start_offset": 267,
"end_offset": 282
},
{
"id": 44821,
"label": "threat-actor",
"start_offset": 267,
"end_offset": 273
}
] | [
{
"id": 175,
"from_id": 44819,
"to_id": 44821,
"type": "related-to"
}
] | [] |
673 | Figure 1. | [] | [] | [] |
674 | The Sofacy document before & after the content is enabled | [
{
"id": 46248,
"label": "malware",
"start_offset": 4,
"end_offset": 10
}
] | [] | [] |
675 | As you can see in this example, attackers try to convince users to disable the security mechanisms added by Microsoft using social engineering, convincing the user to enable content for them to be able to see the full document. | [
{
"id": 45797,
"label": "attack-pattern",
"start_offset": 125,
"end_offset": 143
},
{
"id": 44822,
"label": "identity",
"start_offset": 109,
"end_offset": 118
}
] | [] | [] |
676 | In the Sofacy example, the attackers had simply made the font color white, so the text was present prior to the user enabling macros, just not clearly visible. | [
{
"id": 46249,
"label": "malware",
"start_offset": 7,
"end_offset": 13
}
] | [] | [] |
677 | Embedded Flash files In addition to built-in capabilities, like macros, Office documents can also be embedded with external objects, such as Adobe Flash files. | [
{
"id": 2236,
"label": "location",
"start_offset": 91,
"end_offset": 94
},
{
"id": 46250,
"label": "SOFTWARE",
"start_offset": 143,
"end_offset": 154
}
] | [] | [] |
678 | These objects are passed to the appropriate software for handling, thus any vulnerability that the software has can also be exploited by embedding it within the Adobe Flash content in the Office document. | [
{
"id": 44823,
"label": "SOFTWARE",
"start_offset": 161,
"end_offset": 172
}
] | [] | [] |
679 | An example for such attack vector being leveraged by attackers is CVE-2018-4878, an Adobe Flash Player Zero-Day exploited by embedding malicious SWF files in Excel documents. | [
{
"id": 46251,
"label": "vulnerability",
"start_offset": 66,
"end_offset": 79
},
{
"id": 46252,
"label": "SOFTWARE",
"start_offset": 84,
"end_offset": 102
},
{
"id": 46253,
"label": "attack-pattern",
"start_offset": 125,
"end_offset": 173
}
] | [
{
"id": 176,
"from_id": 46252,
"to_id": 46251,
"type": "has"
},
{
"id": 177,
"from_id": 46251,
"to_id": 46253,
"type": "uses"
}
] | [] |
680 | In these types of attacks, the malicious Excel contains embedded Adobe Flash content which can trigger the Flash vulnerability and execute embedded shellcode. | [
{
"id": 46255,
"label": "vulnerability",
"start_offset": 107,
"end_offset": 126
},
{
"id": 46254,
"label": "SOFTWARE",
"start_offset": 65,
"end_offset": 76
}
] | [] | [] |
681 | Microsoft Equation Editor | [
{
"id": 45798,
"label": "SOFTWARE",
"start_offset": 1,
"end_offset": 26
}
] | [] | [] |
682 | In a similar way to embedding Adobe Flash files into an Office document, you can also embed equations in documents that will be parsed by Microsoft Equation Editor - a program that lets you easily write mathematical equations: Figure 2. Microsoft Equation Editor As in our previous example, vulnerabilities in the equation editor can be exploited by leveraging malicious Office documents. | [
{
"id": 46257,
"label": "SOFTWARE",
"start_offset": 30,
"end_offset": 41
},
{
"id": 46258,
"label": "SOFTWARE",
"start_offset": 138,
"end_offset": 163
},
{
"id": 46256,
"label": "SOFTWARE",
"start_offset": 238,
"end_offset": 263
}
] | [] | [] |
683 | We’ve seen examples of this just recently, when CVE-2017-11882 was exploited in the wild, paving the way to other exploits like CVE-2018-0802, both of which exploit flaws in the equation editor, enabling attackers to get from the user opening an Office document to remote code execution. | [
{
"id": 46259,
"label": "vulnerability",
"start_offset": 48,
"end_offset": 62
},
{
"id": 46260,
"label": "vulnerability",
"start_offset": 128,
"end_offset": 141
},
{
"id": 46261,
"label": "SOFTWARE",
"start_offset": 178,
"end_offset": 193
}
] | [] | [] |
684 | While still not seen in the wild, similar exploits in Microsoft Equation Editor, such as such as CVE-2018-0807 and CVE-2018-0798, were identified by Unit 42 researchers. | [
{
"id": 2275,
"label": "identity",
"start_offset": 149,
"end_offset": 156
},
{
"id": 44827,
"label": "SOFTWARE",
"start_offset": 54,
"end_offset": 79
},
{
"id": 44824,
"label": "vulnerability",
"start_offset": 97,
"end_offset": 110
},
{
"id": 44825,
"label": "vulnerability",
"start_offset": 115,
"end_offset": 128
}
] | [
{
"id": 29,
"from_id": 44827,
"to_id": 44825,
"type": "has"
},
{
"id": 28,
"from_id": 44827,
"to_id": 44824,
"type": "has"
}
] | [] |
685 | Note that since the Microsoft Equation Editor runs as its own process (eqnedt32.exe), protections specific to Microsoft Office such as EMET and Windows Defender Exploit Guard are not effective by default, as they only protect Microsoft Office processes (such as winword.exe). OLE Objects & HTA Handlers | [
{
"id": 46263,
"label": "SOFTWARE",
"start_offset": 144,
"end_offset": 174
},
{
"id": 46264,
"label": "SOFTWARE",
"start_offset": 20,
"end_offset": 45
},
{
"id": 46262,
"label": "SOFTWARE",
"start_offset": 110,
"end_offset": 126
},
{
"id": 46265,
"label": "FILEPATH",
"start_offset": 71,
"end_offset": 83
},
{
"id": 46266,
"label": "SOFTWARE",
"start_offset": 226,
"end_offset": 242
},
{
"id": 46267,
"label": "FILEPATH",
"start_offset": 262,
"end_offset": 273
}
] | [] | [] |
686 | OLE Objects & HTA Handlers are mechanisms Office documents use to make references to include other documents in their content. | [] | [] | [] |
687 | They can be used to compromise an endpoint in the following way: This functionality was leveraged in exploitation of CVE-2017-0199 - a Microsoft Office/WordPad remote code execution (RCE) vulnerability patched by Microsoft in September 2017, and was used in multiple campaigns, like this OilRig campaign. | [
{
"id": 2292,
"label": "identity",
"start_offset": 136,
"end_offset": 145
},
{
"id": 2293,
"label": "tools",
"start_offset": 146,
"end_offset": 152
},
{
"id": 2298,
"label": "malware",
"start_offset": 289,
"end_offset": 295
},
{
"id": 44828,
"label": "vulnerability",
"start_offset": 118,
"end_offset": 131
},
{
"id": 44830,
"label": "campaign",
"start_offset": 289,
"end_offset": 303
},
{
"id": 44829,
"label": "TIME",
"start_offset": 227,
"end_offset": 241
},
{
"id": 44831,
"label": "tools",
"start_offset": 136,
"end_offset": 152
},
{
"id": 44832,
"label": "tools",
"start_offset": 153,
"end_offset": 160
}
] | [
{
"id": 30,
"from_id": 44831,
"to_id": 44828,
"type": "has"
},
{
"id": 31,
"from_id": 44832,
"to_id": 44828,
"type": "has"
},
{
"id": 32,
"from_id": 44830,
"to_id": 44828,
"type": "exploits"
}
] | [] |
688 | Figure 3. | [] | [] | [] |
689 | RTF files will look exactly like regular Word documents | [
{
"id": 46268,
"label": "SOFTWARE",
"start_offset": 41,
"end_offset": 45
}
] | [] | [] |
690 | In addition to the previous OLE & HTA exploit, attackers discovered RTF files can also execute ‘text/html’ mime-type OLE objects using the MSHTML. | [
{
"id": 44833,
"label": "vulnerability",
"start_offset": 28,
"end_offset": 45
}
] | [] | [] |
691 | This means that RTF documents expose the same attack surface as Internet Explorer! | [
{
"id": 46269,
"label": "SOFTWARE",
"start_offset": 64,
"end_offset": 81
}
] | [] | [] |
692 | Leveraging this logical vulnerability, known as CVE-2018-8174, allows attackers to execute arbitrary HTML/JavaScript/VBScript. | [
{
"id": 46270,
"label": "vulnerability",
"start_offset": 48,
"end_offset": 61
},
{
"id": 46271,
"label": "attack-pattern",
"start_offset": 83,
"end_offset": 125
}
] | [] | [] |
693 | While code executed in this way is ‘sandboxed’ (where it cannot run new processes or write to the filesystem etc.), like other code running from Internet Explorer | [
{
"id": 45799,
"label": "SOFTWARE",
"start_offset": 145,
"end_offset": 162
}
] | [] | [] |
694 | , this flaw can be used to leverage other vulnerabilities, such as a memory corruption UAF vulnerability in the VBScript engine, to gain arbitrary code execution in the context of the Word application (winword.exe), allowing them to gain control on the system. | [
{
"id": 46272,
"label": "FILEPATH",
"start_offset": 202,
"end_offset": 213
},
{
"id": 46273,
"label": "SOFTWARE",
"start_offset": 112,
"end_offset": 127
},
{
"id": 46274,
"label": "SOFTWARE",
"start_offset": 184,
"end_offset": 200
}
] | [] | [] |
695 | Conclusion | [] | [] | [] |
696 | While document-based attacks have been a common attack vector for over a decade, we’re seeing a recent rise in their popularity and complexity. | [] | [] | [] |
697 | This rise may be a result of browser exploits becoming more difficult to use, due to the hardening done by browser developers. | [] | [] | [] |
698 | No matter the reason | [] | [] | [] |
699 | , it is important that organizations know how to defend against these common techniques. | [] | [] | [] |
700 | Prevention Palo Alto Networks Traps advanced endpoint protection offers multiple methods of malware and exploit prevention to protect against these threats: | [
{
"id": 2316,
"label": "identity",
"start_offset": 12,
"end_offset": 30
}
] | [] | [] |
701 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! | [] | [] | [] |
702 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
703 | This has been a fun week. | [] | [] | [] |
704 | We have not had a significant cyber event like this – something that affects just about everybody on the Internet -- since the Kaminsky DNS vulnerability of 2008. | [
{
"id": 46276,
"label": "vulnerability",
"start_offset": 127,
"end_offset": 153
},
{
"id": 46275,
"label": "TIME",
"start_offset": 157,
"end_offset": 161
}
] | [] | [] |
705 | Everybody I know has been scrambling to understand what it means to their organization, to their business and to their immediate family. | [] | [] | [] |
706 | Yes, I said family. | [] | [] | [] |
707 | I am sure I am not the only one who has answered a question or two from his mother-in-law about how the Internet is melting down based on what she’s been reading in the press. | [] | [] | [] |
708 | There’s a lot out there already about what Heartbleed means for the Web and beyond, and I’ll point you to our own analysis written by Scott Simkin or an essay by Dan Goodin over at ars technica for that explanation. | [
{
"id": 44834,
"label": "identity",
"start_offset": 135,
"end_offset": 147
},
{
"id": 44835,
"label": "identity",
"start_offset": 163,
"end_offset": 173
},
{
"id": 44836,
"label": "identity",
"start_offset": 182,
"end_offset": 194
},
{
"id": 44837,
"label": "vulnerability",
"start_offset": 44,
"end_offset": 54
}
] | [] | [] |
709 | Instead, here are eight things I am doing right now to protect Palo Alto Networks and my home (and mother-in-law) and that you should be doing, too: | [
{
"id": 46277,
"label": "identity",
"start_offset": 63,
"end_offset": 81
}
] | [] | [] |
710 | If there’s a long-term consideration here, it’s to install perfect forward secrecy, as Twitter did last year. | [
{
"id": 46278,
"label": "SOFTWARE",
"start_offset": 88,
"end_offset": 95
}
] | [] | [] |
711 | That ensures that a session key derived from a stolen private key and a collected public key in the future will not be compromised. | [] | [] | [] |
712 | For more: Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |