July 2, 2012 | Jaime Blasco

Sykipot is back

It has been a while since we published information about Sykipot. The last time we blogged about it, we discovered a variant that was able to bypass two-factor authentication to access protected resources on the victim’s network. We have detected a new wave of Sykipot campaigns that has been running during the past weeks. There are several changes…

June 29, 2012 | Jaime Blasco

New MaControl variant targeting Uyghur users, the Windows version using Gh0st RAT

A couple of hours ago, Kaspersky reported a new variant of the MaControl backdoor targeting Uyghur users. It seems to be a newer version of the MacControl RAT we found some months ago being dropped using Java and Office for Mac exploits. The attackers send mails to the victims with a zip file that contains the backdoor…

Get the latest security news in your inbox.

Subscribe via Email

June 28, 2012 | Jaime Blasco

Thailand NGO site hacked and serving malware

During the previous days, Sophos has reported several attacks related to the Windows XML Core zero-day vulnerability: - http://nakedsecurity.sophos.com/2012/06/26/hotel-jobs-malware/ - http://nakedsecurity.sophos.com/2012/06/20/aeronautical-state-sponsored-exploit/ - http://nakedsecurity.sophos.com/2012/06/19/unpatched-microsoft-security-vulnerability-exploited/ The CVE-2012-1889 vulnerability is related to Google’s warnings on state-sponsored attacks . We have recently found another website exploiting this vulnerability that is related…

June 21, 2012 | Alberto Ortega

Capfire4 malware, RAT software and C&C service together

A big amount of the malware out there are RAT (Remote administration tool) samples. This is software created by people specialized on it, people that develop, improve and sell their tools. It  has capabilities that let the attacker spy on the victims with actions like screen capturing, keylogging, password stealing, command execution and remote access and controlling. Their clients…

June 14, 2012 | Jaime Blasco


Continuing the research on the last spearphishing campaign we published yesterday,  we found that the same group is using another downloader named Win32/Coswid. The dropper is similar to the one we described in the previous report. The main difference is that instead of using an html file to hide the configuration, it gets the config values from…

June 13, 2012 | Jaime Blasco

Ongoing attacks exploiting CVE-2012-1875

Yesterday, Microsoft released the June 2012 Black Tuesday Update including patches for a vulnerability affecting a wide range versions of Internet Explorer. The exploit works across different Windows versions ranging from XP to Windows 7. The 0day has been actively exploited as reported by mcafee. We have been able to find several servers hosting similar versions of the…

June 12, 2012 | Jaime Blasco

Unveiling a spearphishing campaign and possible ramifications

A few days ago, DigitalBond published information about an ongoing spearphishing campaign that affected one of their employees. The attackers were using a pdf document related to ICS (Industrial Control Systems) security as a lure to compromise potential targets within the ICS community. After analyzing the initial information provided, my friend Rubén Santamarta from IOActive and I investigated…

June 4, 2012 | Jaime Blasco

Flamer Indicators Of Compromise (OpenIOC)

Since CrySyS Lab and Kaspersky disclosed the existence of a new malware called Flamer, everyone has been analyzing and discovering new information about its behavior. We will try to summarize some of the Indicators Of Compromise (IOCs) that we can use to detect the presence of the Flamer framework using OpenIOC. Created by Mandiant, OpenIOC is an…

May 30, 2012 | Jaime Blasco

How old is Flame?

As every of you probably know, yesterday Crysys revealed a new threat called Skywiper and also Flame or Flamer. There are rumors that the threat has been out there for a couple of years. Based on our investigations, we have found clues that points to different components related with Flame that has been around for nearly four years. The…

May 6, 2012 | Jaime Blasco

Several Targeted Attacks exploiting Adobe Flash Player (CVE-2012-0779)

A couple of days ago, Adobe issued a security update for Adobe Flash Player that has been detected in the wild targeting specific objectives. Several spear phishing campaigns have been detected. The mails sent contain a Word document attachment. It contains a reference to a Flash file that is downloaded from a remote server once the document is opened. This…

April 23, 2012 | Jaime Blasco

MSUpdater Trojan found using CVE-2012-0158: Space and Missile Defense Conference

The number of samples exploiting CVE-2012-0158 has been growing since we reported some of the first infections last week. We have been detecting several ongoing campaigns against several industries. One of the campaigns which attracted our attention is targeting the military and aerospace industry. Some of the documents sent to the victims have still a low antivirus detection. For…

April 18, 2012 | Jaime Blasco

CVE-2012-0158, Tibet, Targeted Attacks and so on

As our friends at TrendMicro reported a couple of days ago that CVE-2012-0158 is being actively used on different spearphishing campaigns mainly against NGO’s and Tibet related organizations. The vulnerability used was patched by Microsoft a week ago: The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2…

Watch a Demo ›
Get Price Free Trial