Attacks/Breaches
8/7/2012
11:21 AM
Connect Directly
RSS
E-Mail
50%
50%

Beware Phish Email Attack Targeting ADP, Payroll Systems

Emails that appear to come from ADP--and other payroll processing providers--try to exploit PCs using a known Java vulnerability.

11 Security Sights Seen Only At Black Hat
11 Security Sights Seen Only At Black Hat
(click image for larger view and for slideshow)
Beware phishing emails labeled as being from ADP--and other payroll processing providers--which are really designed to exploit PCs using a known Java vulnerability.

According to a security alert issued last week by Automatic Data Processing (ADP), its customers have been receiving fraudulent emails with subject lines such as "ADP Generated Message: First Notice--Digital Certificate Expiration" and "ADP Security Management Update."

"Please note, these emails do not originating (sic) from ADP and they do contain malicious links," according to the ADP advisory. "ADP is working with our security vendors and fraud prevention team to identify and contain the source(s) of these emails."

Security experts said that over the past couple of weeks, many outsourced payroll services customers--not ADP customers--have been targeted by phishing emails that warn that the digital certificate the business uses to communicate with their payroll provider is set to expire. But the link provided for "renewing your digital certificate" instead routes a user to multiple websites, ending in a site that delivers multiple exploits, including one that targets a Java runtime environment (JRE) vulnerability, CVE2012-1723. That vulnerability was patched by Oracle on June 13, but it apparently remains widely unpatched.

[ Read Social Phishing Spikes As Spam Declines, IBM Finds. ]

Attackers began targeting the related vulnerability in exploits beginning in early July, in part because targeting Java helps them sidestep Windows defenses, and the attacks have been steadily increasing. "The Java exploitation process is too easy for the bad guys not to revisit it. The attacker does not have to think about problems with ASLR/DEP, SafeSEH, and other security mechanisms included in the latest versions of Microsoft Windows," according to a blog post from Aleksandr Matrosov, a senior malware researcher at ESET.

According to an analysis of the Java vulnerability published by Microsoft Malware Protection Center researcher Jeong Wook Oh, these types of attacks "show a high success rate with exploitation when Java Runtime Environment is not updated to the latest secure version."

The combination of the Java vulnerability and payroll managers is apparently too big a target for attackers to pass up. "Few things are as juicy for the bad guys as getting a key-logger onto the computer of someone who manages payroll," said SANS incident handler Daniel Wesemann in a blog post. "HR/payroll employees tend to have access to personal data of staff and usually have some form of access to a well-stocked bank account that is used to pay the wages."

From an attacker's perspective, one of the virtues of the payroll phishing campaign is that it's self-selecting--on the part of the victim--meaning that attackers are more likely to net a large number of actual payroll managers. "The average recipient of such a phish ... would have no idea who or what ADP is, and would be highly unlikely to click," Wesemann said. "But [an] HR/payroll employee of a company that actually uses ADP services would certainly be alarmed to read, for example, that his/her access to ADP is about to be cut off."

How should payroll providers--or any security-conscious organization--defend against the wave of targeted phishing attacks? The number-one priority is to patch the "deadly" Java JRE vulnerability because it's being "widely being exploited in the wild at the moment," said Wesemann. "Even better, uninstall Java JRE completely from your computers if you can get away with it," he said.

Unfortunately, antivirus software can't be relied on to stop these types of phishing emails. According to VirusTotal, by Tuesday, the phishing emails related to the ADP attack, for example, were being detected by only eight out of 41 antivirus engines.

Accordingly, Wesemann recommends treating human resources and payroll personnel to internal training of the "don't click this link" variety, reminding them that a single click might be the only thing standing between them and their business being owned by an attacker.

As part of that training, Wesemann also recommended reviewing legitimate communications from the company's payroll providers. "Acquaint yourself with the email logs, so that you know how real email coming from this provider looks like," he said. "This knowledge is priceless during an incident, and might even help you to automatically block some of the more egregious phishes."

When it comes to the battle against distributed denial-of-service attacks, you're not alone. With the increasing use of third-party service providers, your organization likely has a huge arsenal of bandwidth and know-how at its disposal. In our Using Service Providers To Manage DDoS Threats report, find out how to effectively marshal the resources among your providers and integrate them with your own security measures into a strategic and comprehensive DDoS protection plan. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-0889
Published: 2014-07-29
Multiple cross-site scripting (XSS) vulnerabilities in IBM Atlas Suite (aka Atlas Policy Suite), as used in Atlas eDiscovery Process Management through 6.0.3, Disposal and Governance Management for IT through 6.0.3, and Global Retention Policy and Schedule Management through 6.0.3, allow remote atta...

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3020
Published: 2014-07-29
install.sh in the Embedded WebSphere Application Server (eWAS) 7.0 before FP33 in IBM Tivoli Integrated Portal (TIP) 2.1 and 2.2 sets world-writable permissions for the installRoot directory tree, which allows local users to gain privileges via a Trojan horse program.

Best of the Web
Dark Reading Radio