Cyber Security News

New Watering Hole Attack That Used Fake Adobe Flash Player Update To Deliver Malware

Cybersecurity threats are increasingly targeting vulnerabilities in publicly exposed assets like VPNs and firewalls, exploited by various actors, including APT groups and ransomware gangs. 

While this focus is understandable, it’s crucial not to neglect traditional attack vectors like phishing emails, malicious websites, and social engineering, as they remain potent tools in the hands of attackers.

The website of a Japanese university research laboratory was compromised in 2023 via a watering hole attack, likely targeting researchers and students, which highlights the vulnerability of academic institutions to cyber threats and the need for robust security measures to protect sensitive research data. 

 Targeted attacks between 2023 and 2024 Targeted attacks between 2023 and 2024
Targeted attacks between 2023 and 2024

A attack leverages a compromised website to deceive users into downloading a malicious Adobe Flash Player update, which, disguised as legitimate software, is actually malware that infects the user’s system when executed.

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

The watering hole attack employed social engineering to deceive users into manually downloading and executing malware by manipulating a legitimate website they frequently visited, bypassing traditional vulnerability exploitation methods.

The malware, FlashUpdateInstall.exe, disguises itself as a successful Adobe Flash Player update notification, whose primary function is to install the core malware, system32.dll, which could potentially execute malicious activities on the infected system.

Example of malware code

According to JPCERT/CC, a modified system32.dll file, watermarked with 666666 by Cobalt Strike Beacon 4.5, was injected into the Explorer process using Early Bird Injection.

It is leveraging Cloudflare Workers for C2 operations in a watering hole attack, as this group is also associated with other malicious activities, indicating a broader campaign. 

The attacker employed a sophisticated technique involving file name disguise, decoy documents, and malware with customizable options, including stealth mode, anti-analysis disabling, document saving, process injection, and automated execution.

Malware possibly used by the same attacker

The malware injects a DLL into processes, likely to evade detection, which also terminates specific antivirus processes and employs anti-analysis techniques, such as checking system resource usage and virtual machine environments. 

Details of a suspected Cobalt Strike beacon configuration, where the server communicates with patient-flower-*.nifttymailcom.workers.dev using HTTPS and port 443. 

It injects malicious code likely through a downloaded JavaScript file and uses dllhost.exe as a spawnto process, where the configuration includes user-agent spoofing and retrieves additional resources from the server. 

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

OpenVPN Flaw Allows Attackers Crash Servers and Run Remote Code

OpenVPN, a widely-used open-source virtual private network (VPN) software, has recently patched a security vulnerability…

42 minutes ago

Apache Traffic Server Flaw Allows Request Smuggling Attacks

A critical vulnerability has been discovered in Apache Traffic Server (ATS), an open-source caching proxy…

47 minutes ago

Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance

Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces its…

13 hours ago

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券), a…

13 hours ago

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series of…

13 hours ago

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive ransomware,…

14 hours ago