The Windows zero-day vulnerability disclosed this week by Google has been exploited by the Russia-linked cyberespionage group known as Strontium. Microsoft has been working on a patch and expects to release it on November 8.
Google informed Adobe and Microsoft on October 21 that malicious actors had been actively exploiting previously unknown vulnerabilities in Flash Player (CVE-2016-7855) and the Windows kernel. The companies were given 7 days to patch the flaws or publish workarounds that would help users protect themselves against attacks.
Adobe released a patch for Flash Player on October 26, but since Microsoft had not come up with a fix or a workaround, Google decided that it would be in the best interest of users to disclose the Windows flaw. Microsoft does not agree and accused Google of putting its customers at risk.
In a blog post published on Tuesday, Microsoft revealed that the Windows vulnerability has been exploited by the group tracked by the company as Strontium. The threat actor is also known as Pawn Storm, APT28, Fancy Bear, Sednit, Sofacy and Tsar Team.
The group, which many believe is sponsored by the Russian government, has been linked to numerous high-profile attacks, including ones aimed at the U.S. Democratic Party, the World Anti-Doping Agency (WADA), investigators of the flight MH17 crash, and government organizations in Germany and Turkey.
According to Microsoft, the Windows flaw exploited by the group in a low-volume spear-phishing campaign affects Windows Vista through Windows 10 Anniversary Update, but the exploit does not work against the latter due to new mitigations implemented recently by Microsoft.
The attackers have been leveraging the Flash Player vulnerability to gain control of the victim’s browser process, after which they use the Windows kernel flaw to elevate their privileges and escape the browser sandbox. In the last phase of the attack, a backdoor that gives attackers access to the victim’s device is downloaded and executed.
While Microsoft will only release a patch next Tuesday, the company pointed out that security features in Edge, and Device Guard for Internet Explorer and other browsers, should block the final stages of the attack. Furthermore, the company says its Windows Defender Advanced Threat Protection (ATP) system also detects and blocks these attacks.
Related: Russian Cyberspies Use “Komplex” Trojan to Target OS X Systems

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
Latest News
- Backslash Snags $8M Seed Financing for AppSec Tech
- ‘Badsecrets’ Open Source Tool Detects Secrets in Many Web Frameworks
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- Chrome 111 Update Patches High-Severity Vulnerabilities
- BreachForums Shut Down Over Law Enforcement Takeover Concerns
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Malware Trends: What’s Old Is Still New
- Burnout in Cybersecurity – Can It Be Prevented?
