PULSE NAME
EPS Processing Zero-Days Exploited by Multiple Threat Actors
WHITE Turla Group AlienVault 2017-05-09 Modified: 2017-07-21
25
IOCs
MEDIUM VOLUME
Recently, FireEye identified three new zero-day vulnerabilities in Microsoft Office products that are being exploited in the wild. At the end of March 2017, we detected another malicious document leveraging an unknown vulnerability in EPS and a recently patched vulnerability in Windows Graphics Device Interface (GDI) to drop malware. Following the April 2017 Patch Tuesday, in which Microsoft disabled EPS, FireEye detected a second unknown vulnerability in EPS. FireEye believes that two actors – Turla and an unknown financially motivated actor – were using the first EPS zero-day (CVE-2017-0261), and APT28 was using the second EPS zero-day (CVE-2017-0262) along with a new Escalation of Privilege (EOP) zero-day (CVE-2017-0263). Turla and APT28 are Russian cyber espionage groups that have used these zero-days against European diplomatic and military entities. The unidentified financial group targeted regional and global banks with offices in the Middle East.
Indicators of Compromise (5 / 25 total)
All FileHash-SHA256 domain hostname FileHash-MD5 IPv4 CVE FileHash-SHA1 Mutex YARA
TYPEINDICATORDESCRIPTIONCREATED
FileHash-MD5 006bdb19b6936329bffd4054e270dc6a 2017-05-09
FileHash-MD5 15660631e31c1172ba5a299a90938c02 2017-05-09
FileHash-MD5 2abe3cc4bff46455a945d56c27e9fb45 2017-05-09
FileHash-MD5 e091425d23b8db6082b40d25e938f871 2017-05-09
FileHash-MD5 f8e92d8b5488ea76c40601c8f1a08790 2017-05-09