PULSE NAME
APT Group Wekby Leveraging Adobe Flash Exploit
WHITE Wekby AlienVault 2015-07-09 Modified: 2017-08-24
7
IOCs
LOW VOLUME
As if the recent breach and subsequent public data dump involving the Italian company Hacking Team wasn’t bad enough, it all gets just a little bit worse. Emerging from the bowels of Hacking Team data dump was a Flash 0-day exploit (CVE-2015-5119) that was just patched today by Adobe as covered in APSB15-16. The exploit has since been added into the Angler Exploit Kit and integrated into Metasploit. However, not to be out done, APT attackers have also started leveraging the exploit in targeted spear phishing attacks as well. Before we start dishing the details, there is going to be one main takeaway from this blog post: If you haven’t already, update/patch your Adobe Flash now.
Indicators of Compromise (7)
All hostname FileHash-MD5 FileHash-SHA1 CVE
TYPEINDICATORDESCRIPTIONCREATED
hostname info.imly.org 2017-08-24
hostname gmail.bkz88.com 2017-08-24
FileHash-MD5 cfbcb83f8515bd169afd0b22488b4430 2017-08-24
FileHash-MD5 079a440bee0f86d8a59ebc5c4b523a07 2017-08-24
FileHash-SHA1 7389e78cca58de6cb2cbe2b631d2fec259e9cdcc 2017-08-24
FileHash-SHA1 959638ee177b51bda8701c10258b4956f8b1c367 2017-08-24
CVE CVE-2015-5119 2017-08-24