Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Sofacy’s Flash Player Exploit Platform Exposed

Using weaponized Word documents as attachments to phishing emails is not a new attack method, but researchers have discovered an interesting variation: an RTF document with an embedded OLE Word document containing embedded Flash exploits. The purpose is to disguise the attack in layers of obfuscation.

Using weaponized Word documents as attachments to phishing emails is not a new attack method, but researchers have discovered an interesting variation: an RTF document with an embedded OLE Word document containing embedded Flash exploits. The purpose is to disguise the attack in layers of obfuscation.

Unit 42, the research team of Palo Alto Networks, recently discovered two variations of this attack, which it has named DealersChoice.A and DealersChoice.B. In both cases it believes the APT group variously known as Sofacy, APT28, Sednit, Fancy Bear and Tsar Team are behind the attacks.

Sofacy’s targets are usually politically motivated, and the group has been strongly linked to Russia. “Based on our telemetry, the attacks delivering DealersChoice documents occurred in August 2016 and focused primarily on organizations in countries that were part of the former Soviet republic,” reports Unit 42 in a blog post. “These malicious documents were delivered to a Ukrainian-based defense contractor as well as a Ministry of Foreign Affairs of a nation state in the same region, both via phishing attacks.”

DealersChoice.A is self-contained. Everything needed comes with the phishing email. In a sample analyzed by Unit 42, an email addressed to a Ukrainian-based defense contractor declared, “Attached you can find statement about possibility of Russian invasion of Ukraine.” The attached RTF file was the pasted copy of a genuine article that first appeared in the Irish Times eight days earlier.

The RTF loads an embedded Word document, which itself loads one of several embedded Flash files containing the exploit. Internal code checks the version of Flash in use, loads a relevant SWF file, exploits it, and delivers an embedded payload — a version of Carberp.

Unit 42’s analysis uncovered code that checked for Apple’s Mac OSX. This is redundant since the shellcode relies on Windows APIs and simply will not run under OSX. “While we cannot confirm this,” writes Unit 42, “it is possible that the threat actors could use DealersChoice.A to exploit and load an OSX Trojan if prepared with the appropriate shellcode.”

This would be consistent with Unit 42’s September discovery of Komplex— an OSX trojan believed to have been developed and used by Sofacy. It is clear that Sofacy has the expertise to attack both Windows and OSX.

DealersChoice.B, discovered in the same timeframe, is different. It is not self-contained. This one does not contain any Flash files, but rather checks a control server to download the relevant Flash file and payload. Unit 42 believes that the second is an evolutionary development from the first. For one thing, it reduces the size of the weaponized attachment that no longer has to contain multiple SWF files. The stated size on the covering email for DealersChoice.A is 398kb — which is very large for an RTF or Word document; possibly up to ten times the size that could be expected. This alone could trigger alarm bells to the recipient.

Advertisement. Scroll to continue reading.

The researchers were unable to recover the delivered payload from DealersChoice.B and its C2 server, although the server itself has been linked to other Sofacy campaigns. Attempts to gather a payload returned an HTTP 503 error. However, the detail of the response showed the server using Squid. Unit 42 postulates “that the server is most likely set up as a transparent proxy to forward HTTP requests to another server. The use of this Squid proxy suggests the threat actors want to conceal the true location of their C2 server.”

Apart from unveiling a new attack methodology, the analysis “suggests that this threat group is capable of operating in both Windows and Apple environments,” concludes Unit 42. “Our analysis of DealersChoice has also led us to the discovery of a potential tiered infrastructure that leverages transparent proxies to hide the true location of Sofacy’s C2 servers.”

Sofacy is believed to have been involved in this year’s hacking of the Democratic National Committee (DNC), ultimately resulting in the US government accusing the Russian government of involvement. Last week, Kaspersky Lab suggested that the CyberCaliphate name used by the group that attacked and damaged a French television station (TV5Monde) last year is another alias used by Sofacy.

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.