Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Advanced Threats

US Military Warns Companies to Look Out for Iranian Outlook Exploits

Microsoft patched a serious vulnerability in the Microsoft Outlook client in 2017, but an Iranian group continues to exploit the flaw.

The US Cyber Command, the military agency tasked with US online operations, has warned companies and government agencies that malware linked to state-sponsored groups from Iran uses a flaw in Microsoft's Outlook mail client to turn off security features and gain access to users' credentials. 

The vulnerability, patched in October 2017 by Microsoft, continues to be a threat because many companies do not regularly patch their systems. The last attacks used the vulnerability less than three weeks ago, says Nick Carr, senior manager investigating adversary methods at security service provider FireEye. 

In addition, there are some signs that the patch, which turned off the vulnerable feature in Outlook, could be reversed by attackers, he says. 

"This is a really interesting infection vector that we think will continue to be an issue," Carr says. "We are aware of, and our red team and other red teams have exploited, the brittleness of this patch. It can basically be disabled by modifying the registry key to roll back the patch entirely."

The warning comes as political tensions between the Trump administration and Iran continue to ratchet up, with both sides claiming to have launched cyberattacks against the other nation's networks. Security experts have linked the use of the Outlook exploit to two Iranian-sponsored groups, known as APT34, which attacks targets in the Middle East, and APT33, which targets  organizations in the US, Europe, and the Middle East. 

With Iran willing and able to use destructive malware, such as the data-destroying Shamoon attack, companies need to bolster their defenses, says Brandon Levene, head of applied intelligence at Chronicle, the threat intelligence arm of Alphabet, Google's parent company.

"Patch your systems or at least mitigate the outward access of these systems against exploitation if you cannot patch," he says. "The second is that understand if you are a viable target for Iranian interests, then these are things you need to understand as part of your threat models."

The Outlook flaw allows attackers to use the home page feature of the e-mail client to inject their own HTML and VisualBasic code, escaping from the secure sandbox. The vulnerability, CVE-2017-11774, can be triggered remotely, according to security firm SensePost, which discovered the flaw and reported it to Microsoft.

"This does have the downside of not allowing you to easily trigger the home page straight away, but you gain a stealthy persistence method," SensePost stated in its analysis. "I can also recommend you build some 'shell checks' into your exploit, as the home page gets cached by Outlook, so the exploit may trigger even after you have unset the home page value."

While 20 months should be enough time for a company to fix such a flaw, often such issues slip through the security process. The attack has been in use by Iran since at least 2018, security experts say.

On Tuesday USCYBERCOM submitted five files to VirusTotal that the military agency identified as part of an ongoing attack targeting a vulnerability in Microsoft Outlook patched in a regularly scheduled fix in October 2017.  

"USCYBERCOM has discovered active malicious use of CVE-2017-11774 and recommends immediate #patching," the organization stated on Twitter. "Malware is currently delivered from: 'hxxps://customermgmt.net/page/macrocosm' #cybersecurity #infosec"

It's the first time USCYBERCOM has warned companies of a non-Russian attack, Levene says.

Some of the files used in the attack date back to 2016 and 2018. The malicious website, however, is as recent as a couple of weeks. Overall, the warning by USCYBERCOM is not very timely but gives a sense of what the military considers a threat, Levene says.

"Are these technical indicators really useful? Not really," he says. "These are historical indicators. It does set an interesting precedent for allowing us to get a better idea of the TTPs [tactics, techniques, and procedures] and behavior sets that CYBERCOM believes, at least, are relevant even now."

Related Content:


Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.





Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
7/10/2019 | 3:38:19 PM
Re: An option would be to block the country
LOL, sounds like someone made you mad this morning. But I am not sure if I agree with only patching to solve this problem (especially with Windows), have you ever tried to ping an address from MS Windows, put in a rule in the firewall:
ex. New-NetFirewallrule -Name "PSI3" -Description "Block Pings" -Profile Any -Direction "Outbound" -Enabled True -Action Block -RemoteAddress "" -Protocol ICMPv4 -DisplayName PSI3 -LocalAddress Any
ex. Get-NetFirewallRule -DisplayName PSI3

Go to the cmdline and try to ping psi3.secunia.com (with the network of, we are running Windows 10 with all of the patches installed (v1809).

It still allows the user to ping (but this was acknowledged as being fixed in 2014), so if that is the case, then what else is wrong. They stated this potential issue was patched, but ask yourself, but did they?

Hey, this is in the past (I am not sure what happened); however, there is a reason why this is surfacing again (they may not have) just a thought.


User Rank: Ninja
7/10/2019 | 2:48:00 PM
Re: An option would be to block the country
Patch developed in October of 2017 but, gee, not all systems are patched.  WTF?  What has this board been but a warning to patch your sys and applications.  Ergo: EQUIFAX and all that.  And the US government is not patched, well gee, ain't that a no surprise issue.  Sheesh ---- as much as we scream the obvious here, the dummies rule the world. 
User Rank: Ninja
7/5/2019 | 8:42:51 PM
An option would be to block the country
I have not done business with Iranian countries before so for me (not sure about the rest), it would make sense to block this country from a firewall standpoint and block it from the workstation. I know PaloAlto, Juniper, Extremenetworks and others give you this capability but I am not sure of other solutions provide this capability.

I have done this with my Windows servers running powershell scripts:

to (IRAN Addresses, they have to be listed by subnet and not by range, there are about 2725 addresses (at least what I have found)

There are listings of IRAN IP CIDR blocks, as a precaution, block the addresses mentioned. This could at least help address some of the issues.

Just a word to the wise.



COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/17/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-19
An issue was discovered in Tiny Tiny RSS (aka tt-rss) before 2020-09-16. The cached_url feature mishandles JavaScript inside an SVG document.
PUBLISHED: 2020-09-19
** DISPUTED ** Typesetter CMS 5.x through 5.1 allows admins to upload and execute arbitrary PHP code via a .php file inside a ZIP archive. NOTE: the vendor disputes the significance of this report because "admins are considered trustworthy"; however, the behavior "contradicts our secu...
PUBLISHED: 2020-09-19
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with unit().
PUBLISHED: 2020-09-19
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with pair().
PUBLISHED: 2020-09-19
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with From<InlineArray<A, T>>.