Attacks/Breaches
8/7/2012
11:21 AM
50%
50%

Beware Phish Email Attack Targeting ADP, Payroll Systems

Emails that appear to come from ADP--and other payroll processing providers--try to exploit PCs using a known Java vulnerability.

11 Security Sights Seen Only At Black Hat
11 Security Sights Seen Only At Black Hat
(click image for larger view and for slideshow)
Beware phishing emails labeled as being from ADP--and other payroll processing providers--which are really designed to exploit PCs using a known Java vulnerability.

According to a security alert issued last week by Automatic Data Processing (ADP), its customers have been receiving fraudulent emails with subject lines such as "ADP Generated Message: First Notice--Digital Certificate Expiration" and "ADP Security Management Update."

"Please note, these emails do not originating (sic) from ADP and they do contain malicious links," according to the ADP advisory. "ADP is working with our security vendors and fraud prevention team to identify and contain the source(s) of these emails."

Security experts said that over the past couple of weeks, many outsourced payroll services customers--not ADP customers--have been targeted by phishing emails that warn that the digital certificate the business uses to communicate with their payroll provider is set to expire. But the link provided for "renewing your digital certificate" instead routes a user to multiple websites, ending in a site that delivers multiple exploits, including one that targets a Java runtime environment (JRE) vulnerability, CVE2012-1723. That vulnerability was patched by Oracle on June 13, but it apparently remains widely unpatched.

[ Read Social Phishing Spikes As Spam Declines, IBM Finds. ]

Attackers began targeting the related vulnerability in exploits beginning in early July, in part because targeting Java helps them sidestep Windows defenses, and the attacks have been steadily increasing. "The Java exploitation process is too easy for the bad guys not to revisit it. The attacker does not have to think about problems with ASLR/DEP, SafeSEH, and other security mechanisms included in the latest versions of Microsoft Windows," according to a blog post from Aleksandr Matrosov, a senior malware researcher at ESET.

According to an analysis of the Java vulnerability published by Microsoft Malware Protection Center researcher Jeong Wook Oh, these types of attacks "show a high success rate with exploitation when Java Runtime Environment is not updated to the latest secure version."

The combination of the Java vulnerability and payroll managers is apparently too big a target for attackers to pass up. "Few things are as juicy for the bad guys as getting a key-logger onto the computer of someone who manages payroll," said SANS incident handler Daniel Wesemann in a blog post. "HR/payroll employees tend to have access to personal data of staff and usually have some form of access to a well-stocked bank account that is used to pay the wages."

From an attacker's perspective, one of the virtues of the payroll phishing campaign is that it's self-selecting--on the part of the victim--meaning that attackers are more likely to net a large number of actual payroll managers. "The average recipient of such a phish ... would have no idea who or what ADP is, and would be highly unlikely to click," Wesemann said. "But [an] HR/payroll employee of a company that actually uses ADP services would certainly be alarmed to read, for example, that his/her access to ADP is about to be cut off."

How should payroll providers--or any security-conscious organization--defend against the wave of targeted phishing attacks? The number-one priority is to patch the "deadly" Java JRE vulnerability because it's being "widely being exploited in the wild at the moment," said Wesemann. "Even better, uninstall Java JRE completely from your computers if you can get away with it," he said.

Unfortunately, antivirus software can't be relied on to stop these types of phishing emails. According to VirusTotal, by Tuesday, the phishing emails related to the ADP attack, for example, were being detected by only eight out of 41 antivirus engines.

Accordingly, Wesemann recommends treating human resources and payroll personnel to internal training of the "don't click this link" variety, reminding them that a single click might be the only thing standing between them and their business being owned by an attacker.

As part of that training, Wesemann also recommended reviewing legitimate communications from the company's payroll providers. "Acquaint yourself with the email logs, so that you know how real email coming from this provider looks like," he said. "This knowledge is priceless during an incident, and might even help you to automatically block some of the more egregious phishes."

When it comes to the battle against distributed denial-of-service attacks, you're not alone. With the increasing use of third-party service providers, your organization likely has a huge arsenal of bandwidth and know-how at its disposal. In our Using Service Providers To Manage DDoS Threats report, find out how to effectively marshal the resources among your providers and integrate them with your own security measures into a strategic and comprehensive DDoS protection plan. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3308
Published: 2015-09-02
Double free vulnerability in lib/x509/x509_ext.c in GnuTLS before 3.3.14 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted CRL distribution point.

CVE-2015-4330
Published: 2015-09-02
A local file script in Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 allows local users to gain privileges for OS command execution via invalid parameters, aka Bug ID CSCuv10556.

CVE-2015-6274
Published: 2015-09-02
The IPv4 implementation on Cisco ASR 1000 devices with software 15.5(3)S allows remote attackers to cause a denial of service (ESP QFP CPU consumption) by triggering packet fragmentation and reassembly, aka Bug ID CSCuv71273.

CVE-2015-6277
Published: 2015-09-02
The ARP implementation in Cisco NX-OS on Nexus 1000V devices for VMware vSphere 5.2(1)SV3(1.4), Nexus 3000 devices 7.3(0)ZD(0.47), Nexus 4000 devices 4.1(2)E1, Nexus 9000 devices 7.3(0)ZD(0.61), and MDS 9000 devices 7.0(0)HSK(0.353) and SAN-OS NX-OS on MDS 9000 devices 7.0(0)HSK(0.353) allows remote...

CVE-2015-6587
Published: 2015-09-02
The vlserver in OpenAFS before 1.6.13 allows remote authenticated users to cause a denial of service (out-of-bounds read and crash) via a crafted regular expression in a VL_ListAttributesN2 RPC.

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.