• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

Russian Military Focused by Chinese language Hackers Using Malicious Word Files

Darkode

Alfrescian
Loyal

Russian Military Focused by Chinese language Hackers Using Malicious Word Files

Mail Room Las Vegas Blog

Aliens-Mail-Room.png


Reported From Area 51.

lasvegasnvblog_508clasvegasnvblog_se-hackers-using-malicious-word-files-492027-3-350x285.jpg


A marketing crusade concentrating on Russian military personnel has-been noticed by Proofpoint, a US-based Safety-as-a-Service vendor, which it attributes to a hacking group operating out of China.

In accordance to the company’s safety researchers, the group was previously tracked by its staff & different safety vendors, & is understood in business circles as TA459.

Proofpoint has 1st noticed this marketing crusade in Jul. 2015, claiming it is nonetheless at present raging on, additionally affecting telecom & monetary corporations related to the military targets where the 1st assaults have been detected.

Attackers use spear-phishing & malicious Word files To accomplish access to their victim’s computers, the hackers are using spear-phishing emails, aimed toward military personnel, which come hooked up with a malicious Word document.

As Proofpoint elaborates, this document is configured with a special macro, which mechanically executes a set of commands when the user closes the Word file, leveraging CVE-2012-0158, a really known & extensively exploited Microsoft Word vulnerability.

This eventually leads to the user being contaminated with PlugX (Korplug), a Remote Access Trojan (RAT), which accurately provides attackers full control over their victim’s pc.

Once this happens, using commands received from their C&C server, the hackers begin exfiltrating knowledge from the contaminated computers or infect it with different malware to do more injury.

The- info stolen from these assaults could moreover be simply be sold on the black market, yet when the group is state-sponsored, it might be added to China’s strategic intel of its North-bordering neighbor.



 
Top