Monday, December 23, 2024
HomeCyber Security NewsNew Watering Hole Attack That Used Fake Adobe Flash Player Update To...

New Watering Hole Attack That Used Fake Adobe Flash Player Update To Deliver Malware

Published on

SIEM as a Service

Cybersecurity threats are increasingly targeting vulnerabilities in publicly exposed assets like VPNs and firewalls, exploited by various actors, including APT groups and ransomware gangs. 

While this focus is understandable, it’s crucial not to neglect traditional attack vectors like phishing emails, malicious websites, and social engineering, as they remain potent tools in the hands of attackers.

The website of a Japanese university research laboratory was compromised in 2023 via a watering hole attack, likely targeting researchers and students, which highlights the vulnerability of academic institutions to cyber threats and the need for robust security measures to protect sensitive research data. 

- Advertisement - SIEM as a Service
 Targeted attacks between 2023 and 2024
 Targeted attacks between 2023 and 2024

A attack leverages a compromised website to deceive users into downloading a malicious Adobe Flash Player update, which, disguised as legitimate software, is actually malware that infects the user’s system when executed.

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

The watering hole attack employed social engineering to deceive users into manually downloading and executing malware by manipulating a legitimate website they frequently visited, bypassing traditional vulnerability exploitation methods.

The malware, FlashUpdateInstall.exe, disguises itself as a successful Adobe Flash Player update notification, whose primary function is to install the core malware, system32.dll, which could potentially execute malicious activities on the infected system.

 Example of malware code
 Example of malware code

According to JPCERT/CC, a modified system32.dll file, watermarked with 666666 by Cobalt Strike Beacon 4.5, was injected into the Explorer process using Early Bird Injection.

It is leveraging Cloudflare Workers for C2 operations in a watering hole attack, as this group is also associated with other malicious activities, indicating a broader campaign. 

The attacker employed a sophisticated technique involving file name disguise, decoy documents, and malware with customizable options, including stealth mode, anti-analysis disabling, document saving, process injection, and automated execution.

Malware possibly used by the same attacker
Malware possibly used by the same attacker

The malware injects a DLL into processes, likely to evade detection, which also terminates specific antivirus processes and employs anti-analysis techniques, such as checking system resource usage and virtual machine environments. 

Details of a suspected Cobalt Strike beacon configuration, where the server communicates with patient-flower-*.nifttymailcom.workers.dev using HTTPS and port 443. 

It injects malicious code likely through a downloaded JavaScript file and uses dllhost.exe as a spawnto process, where the configuration includes user-agent spoofing and retrieves additional resources from the server. 

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Latest articles

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer...

BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques

An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the...

Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications

A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store,...

Lazarus Hackers Using New VNC Based Malware To Attack Organizations Worldwide

The Lazarus Group has recently employed a sophisticated attack, dubbed "Operation DreamJob," to target...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer...

BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques

An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the...

Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications

A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store,...