Menu
Microsoft Word exploit linked to cyberspying in Ukraine conflict

Microsoft Word exploit linked to cyberspying in Ukraine conflict

The attack appears to have occurred in January, before Microsoft became aware of the flaw

A previously unknown Microsoft Office vulnerability was recently used to deliver spyware to Russian-speaking targets, in a possible case of cyberespionage.

Security firm FireEye noticed the intrusion attempt, which taps a critical software flaw that hackers are using to craft malicious Microsoft Word documents.

On Wednesday, FireEye said it uncovered one attack that weaponized a Russian military training manual. Once opened, the malicious document will deliver FinSpy, a surveillance software that’s been marketed to governments.

It’s unclear who the document was targeting. However, it appears to have been published in the Donetsk People’s Republic, a breakaway region in Ukraine that’s received Russian support.

FinSpy, also known as FinFisher, is developed by a subsidiary of Gamma Group, a European firm that specializes in surveillance and monitoring equipment. Thirty-three governments have been suspected of using the firm's spyware, according to a 2015 investigation from Citizen Lab.

FireEye said the malicious Russian training manual can download additional malware payloads to the victim’s computer, along with another fake document claiming to be a Russian decree approving a forest management plan.

The attack appears to have occurred this January, months before Microsoft became aware of the vulnerability. Given that Gamma Group probably has a long list of government customers, FireEye suspects other parties may have hacked targets in the same way, using FinSpy.

It’s also possible that knowledge about the Microsoft vulnerability may have been circulated in the hacking community.

In March, a separate attack was found using the vulnerability but instead to deliver malware that’s been involved in financial crimes.

However, FireEye said that both this attack and the intrusion attempt against Russian-speaking targets share similar code. This suggests different hacking groups may have gotten information about Microsoft vulnerability from the same source.

Fortunately, Microsoft on Tuesday issued a patch to fix the flaw. Security researchers warn that opening email attachments remain a major source of malware infections.


Follow Us

Join the newsletter!

Or
Error: Please check your email address.

Featured

Slideshows

Bumper channel crowd kicks off first After Hours of 2018

Bumper channel crowd kicks off first After Hours of 2018

After Hours made a welcome return to the channel social calendar with a bumper crowd of partners, distributors and vendors descending on The Jefferson in Auckland to kick-start 2018. Photos by Gino Demeer.

Bumper channel crowd kicks off first After Hours of 2018
Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Show Comments