Attacks/Breaches
8/7/2012
11:21 AM
Connect Directly
RSS
E-Mail
50%
50%

Beware Phish Email Attack Targeting ADP, Payroll Systems

Emails that appear to come from ADP--and other payroll processing providers--try to exploit PCs using a known Java vulnerability.

11 Security Sights Seen Only At Black Hat
11 Security Sights Seen Only At Black Hat
(click image for larger view and for slideshow)
Beware phishing emails labeled as being from ADP--and other payroll processing providers--which are really designed to exploit PCs using a known Java vulnerability.

According to a security alert issued last week by Automatic Data Processing (ADP), its customers have been receiving fraudulent emails with subject lines such as "ADP Generated Message: First Notice--Digital Certificate Expiration" and "ADP Security Management Update."

"Please note, these emails do not originating (sic) from ADP and they do contain malicious links," according to the ADP advisory. "ADP is working with our security vendors and fraud prevention team to identify and contain the source(s) of these emails."

Security experts said that over the past couple of weeks, many outsourced payroll services customers--not ADP customers--have been targeted by phishing emails that warn that the digital certificate the business uses to communicate with their payroll provider is set to expire. But the link provided for "renewing your digital certificate" instead routes a user to multiple websites, ending in a site that delivers multiple exploits, including one that targets a Java runtime environment (JRE) vulnerability, CVE2012-1723. That vulnerability was patched by Oracle on June 13, but it apparently remains widely unpatched.

[ Read Social Phishing Spikes As Spam Declines, IBM Finds. ]

Attackers began targeting the related vulnerability in exploits beginning in early July, in part because targeting Java helps them sidestep Windows defenses, and the attacks have been steadily increasing. "The Java exploitation process is too easy for the bad guys not to revisit it. The attacker does not have to think about problems with ASLR/DEP, SafeSEH, and other security mechanisms included in the latest versions of Microsoft Windows," according to a blog post from Aleksandr Matrosov, a senior malware researcher at ESET.

According to an analysis of the Java vulnerability published by Microsoft Malware Protection Center researcher Jeong Wook Oh, these types of attacks "show a high success rate with exploitation when Java Runtime Environment is not updated to the latest secure version."

The combination of the Java vulnerability and payroll managers is apparently too big a target for attackers to pass up. "Few things are as juicy for the bad guys as getting a key-logger onto the computer of someone who manages payroll," said SANS incident handler Daniel Wesemann in a blog post. "HR/payroll employees tend to have access to personal data of staff and usually have some form of access to a well-stocked bank account that is used to pay the wages."

From an attacker's perspective, one of the virtues of the payroll phishing campaign is that it's self-selecting--on the part of the victim--meaning that attackers are more likely to net a large number of actual payroll managers. "The average recipient of such a phish ... would have no idea who or what ADP is, and would be highly unlikely to click," Wesemann said. "But [an] HR/payroll employee of a company that actually uses ADP services would certainly be alarmed to read, for example, that his/her access to ADP is about to be cut off."

How should payroll providers--or any security-conscious organization--defend against the wave of targeted phishing attacks? The number-one priority is to patch the "deadly" Java JRE vulnerability because it's being "widely being exploited in the wild at the moment," said Wesemann. "Even better, uninstall Java JRE completely from your computers if you can get away with it," he said.

Unfortunately, antivirus software can't be relied on to stop these types of phishing emails. According to VirusTotal, by Tuesday, the phishing emails related to the ADP attack, for example, were being detected by only eight out of 41 antivirus engines.

Accordingly, Wesemann recommends treating human resources and payroll personnel to internal training of the "don't click this link" variety, reminding them that a single click might be the only thing standing between them and their business being owned by an attacker.

As part of that training, Wesemann also recommended reviewing legitimate communications from the company's payroll providers. "Acquaint yourself with the email logs, so that you know how real email coming from this provider looks like," he said. "This knowledge is priceless during an incident, and might even help you to automatically block some of the more egregious phishes."

When it comes to the battle against distributed denial-of-service attacks, you're not alone. With the increasing use of third-party service providers, your organization likely has a huge arsenal of bandwidth and know-how at its disposal. In our Using Service Providers To Manage DDoS Threats report, find out how to effectively marshal the resources among your providers and integrate them with your own security measures into a strategic and comprehensive DDoS protection plan. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2363
Published: 2014-07-26
Morpho Itemiser 3 8.17 has hardcoded administrative credentials, which makes it easier for remote attackers to obtain access via a login request.

CVE-2014-3071
Published: 2014-07-26
Cross-site scripting (XSS) vulnerability in the Data Quality Console in IBM InfoSphere Information Server 11.3 allows remote attackers to inject arbitrary web script or HTML via a crafted URL for adding a project connection.

CVE-2014-3301
Published: 2014-07-26
The ProfileAction controller in Cisco WebEx Meetings Server (CWMS) 1.5(.1.131) and earlier allows remote attackers to obtain sensitive information by reading stack traces in returned messages, aka Bug ID CSCuj81700.

CVE-2014-3305
Published: 2014-07-26
Cross-site request forgery (CSRF) vulnerability in the web framework in Cisco WebEx Meetings Server 1.5(.1.131) and earlier allows remote attackers to hijack the authentication of unspecified victims via unknown vectors, aka Bug ID CSCuj81735.

CVE-2014-3324
Published: 2014-07-26
Multiple cross-site scripting (XSS) vulnerabilities in the login page in the administrative web interface in Cisco TelePresence Server Software 4.0(2.8) allow remote attackers to inject arbitrary web script or HTML via a crafted parameter, aka Bug ID CSCup90060.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.