Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Advanced Threats

US Military Warns Companies to Look Out for Iranian Outlook Exploits

Microsoft patched a serious vulnerability in the Microsoft Outlook client in 2017, but an Iranian group continues to exploit the flaw.

The US Cyber Command, the military agency tasked with US online operations, has warned companies and government agencies that malware linked to state-sponsored groups from Iran uses a flaw in Microsoft's Outlook mail client to turn off security features and gain access to users' credentials. 

The vulnerability, patched in October 2017 by Microsoft, continues to be a threat because many companies do not regularly patch their systems. The last attacks used the vulnerability less than three weeks ago, says Nick Carr, senior manager investigating adversary methods at security service provider FireEye. 

In addition, there are some signs that the patch, which turned off the vulnerable feature in Outlook, could be reversed by attackers, he says. 

"This is a really interesting infection vector that we think will continue to be an issue," Carr says. "We are aware of, and our red team and other red teams have exploited, the brittleness of this patch. It can basically be disabled by modifying the registry key to roll back the patch entirely."

The warning comes as political tensions between the Trump administration and Iran continue to ratchet up, with both sides claiming to have launched cyberattacks against the other nation's networks. Security experts have linked the use of the Outlook exploit to two Iranian-sponsored groups, known as APT34, which attacks targets in the Middle East, and APT33, which targets  organizations in the US, Europe, and the Middle East. 

With Iran willing and able to use destructive malware, such as the data-destroying Shamoon attack, companies need to bolster their defenses, says Brandon Levene, head of applied intelligence at Chronicle, the threat intelligence arm of Alphabet, Google's parent company.

"Patch your systems or at least mitigate the outward access of these systems against exploitation if you cannot patch," he says. "The second is that understand if you are a viable target for Iranian interests, then these are things you need to understand as part of your threat models."

The Outlook flaw allows attackers to use the home page feature of the e-mail client to inject their own HTML and VisualBasic code, escaping from the secure sandbox. The vulnerability, CVE-2017-11774, can be triggered remotely, according to security firm SensePost, which discovered the flaw and reported it to Microsoft.

"This does have the downside of not allowing you to easily trigger the home page straight away, but you gain a stealthy persistence method," SensePost stated in its analysis. "I can also recommend you build some 'shell checks' into your exploit, as the home page gets cached by Outlook, so the exploit may trigger even after you have unset the home page value."

While 20 months should be enough time for a company to fix such a flaw, often such issues slip through the security process. The attack has been in use by Iran since at least 2018, security experts say.

On Tuesday USCYBERCOM submitted five files to VirusTotal that the military agency identified as part of an ongoing attack targeting a vulnerability in Microsoft Outlook patched in a regularly scheduled fix in October 2017.  

"USCYBERCOM has discovered active malicious use of CVE-2017-11774 and recommends immediate #patching," the organization stated on Twitter. "Malware is currently delivered from: 'hxxps://customermgmt.net/page/macrocosm' #cybersecurity #infosec"

It's the first time USCYBERCOM has warned companies of a non-Russian attack, Levene says.

Some of the files used in the attack date back to 2016 and 2018. The malicious website, however, is as recent as a couple of weeks. Overall, the warning by USCYBERCOM is not very timely but gives a sense of what the military considers a threat, Levene says.

"Are these technical indicators really useful? Not really," he says. "These are historical indicators. It does set an interesting precedent for allowing us to get a better idea of the TTPs [tactics, techniques, and procedures] and behavior sets that CYBERCOM believes, at least, are relevant even now."

Related Content:


Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.





Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
7/10/2019 | 3:38:19 PM
Re: An option would be to block the country
LOL, sounds like someone made you mad this morning. But I am not sure if I agree with only patching to solve this problem (especially with Windows), have you ever tried to ping an address from MS Windows, put in a rule in the firewall:
ex. New-NetFirewallrule -Name "PSI3" -Description "Block Pings" -Profile Any -Direction "Outbound" -Enabled True -Action Block -RemoteAddress "" -Protocol ICMPv4 -DisplayName PSI3 -LocalAddress Any
ex. Get-NetFirewallRule -DisplayName PSI3

Go to the cmdline and try to ping psi3.secunia.com (with the network of, we are running Windows 10 with all of the patches installed (v1809).

It still allows the user to ping (but this was acknowledged as being fixed in 2014), so if that is the case, then what else is wrong. They stated this potential issue was patched, but ask yourself, but did they?

Hey, this is in the past (I am not sure what happened); however, there is a reason why this is surfacing again (they may not have) just a thought.


User Rank: Ninja
7/10/2019 | 2:48:00 PM
Re: An option would be to block the country
Patch developed in October of 2017 but, gee, not all systems are patched.  WTF?  What has this board been but a warning to patch your sys and applications.  Ergo: EQUIFAX and all that.  And the US government is not patched, well gee, ain't that a no surprise issue.  Sheesh ---- as much as we scream the obvious here, the dummies rule the world. 
User Rank: Ninja
7/5/2019 | 8:42:51 PM
An option would be to block the country
I have not done business with Iranian countries before so for me (not sure about the rest), it would make sense to block this country from a firewall standpoint and block it from the workstation. I know PaloAlto, Juniper, Extremenetworks and others give you this capability but I am not sure of other solutions provide this capability.

I have done this with my Windows servers running powershell scripts:

to (IRAN Addresses, they have to be listed by subnet and not by range, there are about 2725 addresses (at least what I have found)

There are listings of IRAN IP CIDR blocks, as a precaution, block the addresses mentioned. This could at least help address some of the issues.

Just a word to the wise.



7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: What Virtual Reality phishing attacks will look like in 2030.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-11
A cross-site request forgery (CSRF) vulnerability in Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
PUBLISHED: 2021-05-11
Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier does not perform a permission check in an HTTP endpoint, allowing with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
PUBLISHED: 2021-05-11
Jenkins P4 Plugin 1.11.4 and earlier does not perform permission checks in multiple HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified Perforce server using attacker-specified username and password.
PUBLISHED: 2021-05-11
A cross-site request forgery (CSRF) vulnerability in Jenkins P4 Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified Perforce server using attacker-specified username and password.
PUBLISHED: 2021-05-11
Jenkins Xcode integration Plugin 2.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.