Hackers Targeting New Flash Vulnerability | Digital Guardian

The Industry’s Only SaaS-Delivered Enterprise DLP

Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.

No-Compromise Data Protection is:

  • Cloud-Delivered
  • Cross Platform
  • Flexible Controls

Digital Guardian's Blog

Hackers Targeting New Flash Vulnerability

Attackers with ties to North Korea are using a critical vulnerability in Adobe Flash in a new targeted attack campaign.

The vulnerability is in all versions of Flash from downward, and researchers say it is being used by an attack group that is known to install malware that can erase data on compromised machines. The attackers behind the campaign have run attacks against a variety of high-value targets in the past, researchers say.

“We assess that the actors employing this latest Flash zero-day are a suspected North Korean group we track as TEMP.Reaper. We have observed TEMP.Reaper operators directly interacting with their command and control infrastructure from IP addresses assigned to the STAR-KP network in Pyongyang,” researchers at FireEye said in an analysis of the attacks.

“The STAR-KP network is operated as a joint venture between the North Korean Government's Post and Telecommunications Corporation and Thailand-based Loxley Pacific. Historically, the majority of their targeting has been focused on the South Korean government, military, and defense industrial base; however, they have expanded to other international targets in the last year. They have taken interest in subject matter of direct importance to the Democratic People's Republic of Korea (DPRK) such as Korean unification efforts and North Korean defectors.”

FireEye’s researchers said that the attackers are using rigged spreadsheets or documents to deliver the exploit for the Flash vulnerability.

“Upon opening and successful exploitation, a decryption key for an encrypted embedded payload would be downloaded from compromised third party websites hosted in South Korea. Preliminary analysis indicates that the vulnerability was likely used to distribute the previously observed DOGCALL malware to South Korean victims,” FireEye’s researchers said.

Adobe has released a fix for the vulnerability, and users should install the patch as soon as possible.

Dennis Fisher


Data Protection Vendor Evaluation Toolkit

Dennis Fisher

Dennis Fisher is editor-in-chief at Duo Security. He is an award-winning technology journalist who has specialized in covering information security and privacy for the last 15 years. Prior to joining Duo, he was one of the founding editors of On the Wire, Threatpost and previously covered security for TechTarget and eWeek.