PULSE NAME
MWI Integrates CVE-2017-0199, Utilized by Cobalt Group to Target Financial Institutions
WHITE xav 2017-06-04 Modified: 2017-06-04
0
IOCs
LOW VOLUME
In May, Proofpoint observed multiple campaigns using a new version of Microsoft Word Intruder (MWI). MWI is a tool sold on underground markets for creating exploit-laden documents, generally used in targeted attacks. We previously reported about MWI when it added support for CVE-2016-4117 [2]. After the latest update, MWI is now using CVE-2017-0199 [4][5] to launch an HTML Application (HTA) used for both information collection and payload execution. This activity targets organizations in the financial vertical including banks, banking software vendors, and ATM software and hardware vendors. The emails are sent to technology and security personnel working in departments including Fraud and Information Security. The actor is believed to be the Cobalt group -- an actor known to target banks in Europe and Asia and previously documented by Group IB [1]. The malicious documents created with MWI delivered Metasploit Stager, Cobalt Strike, and previously undocumented malware we named Cyst Downloader
Indicators of Compromise (0)
All
No indicators.