Jump to content
Aerosol

Hackers hitting Adobe zero-day with BEDEP malware

Recommended Posts

hacker-hacking-dark-hoodie-540x334.jpg?1414221195

Hackers are using a zero-day vulnerability in Adobe Flash to infect systems with a dangerous BEDEP malware variant.

Trend Micro research engineer Alvin Bacani reported uncovering the campaign in a threat advisory, proving that hackers began targeting the zero-day less than a week after its discovery.

"Continuing our analysis of the recent Adobe zero-day exploit, we find that the infection chain does not end with the Flash exploit, detected as SWF_EXPLOIT.MJST. Rather, the exploit downloads and executes malware belonging to the BEDEP family," read the advisory.

Trend Micro reported uncovering the Flash flaw on 2 February, warning that attackers could target victims with malvertising attacks.

The flaw is originally believed to have been targeted by hackers using the Angler Exploit Kit to send malicious automatic pop-up adverts.

Bacani explained that BEDEP employs the same malvertising infection tactic, but uses the Hanjuan exploit kit to connect victim machines to a criminal botnet.

"Based on our analysis, the infection chain begins with a site that hosts malvertisements. As the name implies, these are infected online advertisements," read the advisory.

"Our recent findings also show that the malware's main purpose is to turn infected systems into botnets for other malicious intentions.

"Additionally, BEDEP is known for carrying out advertising fraud routines and downloading additional malware."

The full scale of the campaign remains unknown and the nature of the BEDEP malware makes tracking the attacks difficult.

"The fact that the payloads are encoded can be seen as one way of evading detection. An encoded payload will be difficult to identify when passing through the network layer, or when scanned in any layer in an encoded state," noted Bacani.

"BEDEP initially came undetected and unnoticed due to its heavy encryption and use of Microsoft file properties for its disguise as well as the use of seemingly legitimate export functions."

The flaw is one of three recently discovered Flash zero-day vulnerabilities. The first two were uncovered by Adobe in January and are known to have been actively targeted by hackers.

Source

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...