PULSE NAME
Pawn Storm Ramps Up Spear-phishing Before Zero-Days Get Patched
WHITE Sofacy AlienVault 2016-11-09 Modified: 2016-11-09
20
IOCs
MEDIUM VOLUME
The effectiveness of a zero-day quickly deteriorates as an attack tool after it gets discovered and patched by the affected software vendors. Within the time between the discovery of the vulnerability and the release of the fix, a bad actor might try to get the most out of his previously valuable attack assets. This is exactly what we saw in late October and early November 2016, when the espionage group Pawn Storm (also known as Fancy Bear, APT28, Sofacy, and STRONTIUM) ramped up its spear-phishing campaigns against various governments and embassies around the world. In these campaigns, Pawn Storm used a previously unknown zero-day in Adobe’s Flash (CVE-2016-7855, fixed on October 26, 2016 with an emergency update) in combination with a privilege escalation in Microsoft’s Windows Operating System (CVE-2016-7255) that was fixed on November 8, 2016.
Indicators of Compromise (20)
All domain FileHash-SHA1 CVE
TYPEINDICATORDESCRIPTIONCREATED
domain securityprotectingcorp.com 2016-11-09
domain defenceglobalnews.com 2016-11-09
domain globaldefencetalk.com 2016-11-09
domain pressservices.net 2016-11-09
domain windowsdefltr.net 2016-11-09
domain worldpressjournal.com 2016-11-09
domain versiontask.com 2016-11-09
domain appexsrv.net 2016-11-09
domain worldpostjournal.com 2016-11-09
domain abc24news.com 2016-11-09
domain microsoftstoreservice.com 2016-11-09
domain washingtnpostnews.com 2016-11-09
domain uniquecorpind.com 2016-11-09
domain politlco.com 2016-11-09
domain servicetlnt.net 2016-11-09
FileHash-SHA1 cb1e30e6e583178f8d4bf6a487a399bd341c0cdc 2016-11-09
FileHash-SHA1 c2f8ea43f0599444d0f6334fc6634082fdd4a69f 2016-11-09
FileHash-SHA1 4173b29a251cd9c1cab135f67cb60acab4ace0c5 2016-11-09
CVE CVE-2016-7855 2016-11-09
CVE CVE-2016-7255 2016-11-09