FireEye discovered CVE-2017-8759 flaw patched by Microsoft this week.
FireEye researchers recently discovered a malicious Microsoft Office RTF document using CVE-2017-8759, a SOAP WSDL parser code injection vulnerability. They reported details of the flaw to Microsoft, which issued a patch earlier this week.
CVE-2017-8759 lets an attacker inject arbitrary code during the parsing of SOAP WSDL definition contents. FireEye analyzed a Word document in which threat actors used the injection to download and execute a Visual Basic script containing PowerShell commands.
When successfully exploited, the vulnerability downloads several components and launches FINSPY surveillance software. The malware, also reported as FinFisher or WingBird, can be bought as part of a "lawful intercept" capability, referring to functions in telecommunications that let law enforcement wiretap individuals. Analysts say "with moderate confidence" the malicious document was used by a nation-state to target a Russian-speaking victim for cyberespionage.
This marks the second zero-day flaw used to distribute FINSPY that FireEye has discovered this year, which the company says demonstrates the many resources available to "lawful intercept" companies and customers. FINSPY has been sold to several clients, suggesting broader use.
Read more details here.
Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.
About the Author(s)
You May Also Like
Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them
April 4, 2024Cybersecurity Strategies for Small and Med Sized Businesses
April 11, 2024Defending Against Today's Threat Landscape with MDR
April 18, 2024Securing Code in the Age of AI
April 24, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024Black Hat Asia - April 16-19 - Learn More
April 16, 2024