Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Advanced Threats

US Military Warns Companies to Look Out for Iranian Outlook Exploits

Microsoft patched a serious vulnerability in the Microsoft Outlook client in 2017, but an Iranian group continues to exploit the flaw.

The US Cyber Command, the military agency tasked with US online operations, has warned companies and government agencies that malware linked to state-sponsored groups from Iran uses a flaw in Microsoft's Outlook mail client to turn off security features and gain access to users' credentials. 

The vulnerability, patched in October 2017 by Microsoft, continues to be a threat because many companies do not regularly patch their systems. The last attacks used the vulnerability less than three weeks ago, says Nick Carr, senior manager investigating adversary methods at security service provider FireEye. 

In addition, there are some signs that the patch, which turned off the vulnerable feature in Outlook, could be reversed by attackers, he says. 

"This is a really interesting infection vector that we think will continue to be an issue," Carr says. "We are aware of, and our red team and other red teams have exploited, the brittleness of this patch. It can basically be disabled by modifying the registry key to roll back the patch entirely."

The warning comes as political tensions between the Trump administration and Iran continue to ratchet up, with both sides claiming to have launched cyberattacks against the other nation's networks. Security experts have linked the use of the Outlook exploit to two Iranian-sponsored groups, known as APT34, which attacks targets in the Middle East, and APT33, which targets  organizations in the US, Europe, and the Middle East. 

With Iran willing and able to use destructive malware, such as the data-destroying Shamoon attack, companies need to bolster their defenses, says Brandon Levene, head of applied intelligence at Chronicle, the threat intelligence arm of Alphabet, Google's parent company.

"Patch your systems or at least mitigate the outward access of these systems against exploitation if you cannot patch," he says. "The second is that understand if you are a viable target for Iranian interests, then these are things you need to understand as part of your threat models."

The Outlook flaw allows attackers to use the home page feature of the e-mail client to inject their own HTML and VisualBasic code, escaping from the secure sandbox. The vulnerability, CVE-2017-11774, can be triggered remotely, according to security firm SensePost, which discovered the flaw and reported it to Microsoft.

"This does have the downside of not allowing you to easily trigger the home page straight away, but you gain a stealthy persistence method," SensePost stated in its analysis. "I can also recommend you build some 'shell checks' into your exploit, as the home page gets cached by Outlook, so the exploit may trigger even after you have unset the home page value."

While 20 months should be enough time for a company to fix such a flaw, often such issues slip through the security process. The attack has been in use by Iran since at least 2018, security experts say.

On Tuesday USCYBERCOM submitted five files to VirusTotal that the military agency identified as part of an ongoing attack targeting a vulnerability in Microsoft Outlook patched in a regularly scheduled fix in October 2017.  

"USCYBERCOM has discovered active malicious use of CVE-2017-11774 and recommends immediate #patching," the organization stated on Twitter. "Malware is currently delivered from: 'hxxps://customermgmt.net/page/macrocosm' #cybersecurity #infosec"

It's the first time USCYBERCOM has warned companies of a non-Russian attack, Levene says.

Some of the files used in the attack date back to 2016 and 2018. The malicious website, however, is as recent as a couple of weeks. Overall, the warning by USCYBERCOM is not very timely but gives a sense of what the military considers a threat, Levene says.

"Are these technical indicators really useful? Not really," he says. "These are historical indicators. It does set an interesting precedent for allowing us to get a better idea of the TTPs [tactics, techniques, and procedures] and behavior sets that CYBERCOM believes, at least, are relevant even now."

Related Content:

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

 

 

 

 

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
tdsan
50%
50%
tdsan,
User Rank: Ninja
7/10/2019 | 3:38:19 PM
Re: An option would be to block the country
LOL, sounds like someone made you mad this morning. But I am not sure if I agree with only patching to solve this problem (especially with Windows), have you ever tried to ping an address from MS Windows, put in a rule in the firewall:
ex. New-NetFirewallrule -Name "PSI3" -Description "Block Pings" -Profile Any -Direction "Outbound" -Enabled True -Action Block -RemoteAddress "52.128.0.0/16" -Protocol ICMPv4 -DisplayName PSI3 -LocalAddress Any
ex. Get-NetFirewallRule -DisplayName PSI3

Go to the cmdline and try to ping psi3.secunia.com (with the network of 52.128.0.0), we are running Windows 10 with all of the patches installed (v1809).

It still allows the user to ping (but this was acknowledged as being fixed in 2014), so if that is the case, then what else is wrong. They stated this potential issue was patched, but ask yourself, but did they?

Hey, this is in the past (I am not sure what happened); however, there is a reason why this is surfacing again (they may not have) just a thought.

T

 
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
7/10/2019 | 2:48:00 PM
Re: An option would be to block the country
Patch developed in October of 2017 but, gee, not all systems are patched.  WTF?  What has this board been but a warning to patch your sys and applications.  Ergo: EQUIFAX and all that.  And the US government is not patched, well gee, ain't that a no surprise issue.  Sheesh ---- as much as we scream the obvious here, the dummies rule the world. 
tdsan
50%
50%
tdsan,
User Rank: Ninja
7/5/2019 | 8:42:51 PM
An option would be to block the country
I have not done business with Iranian countries before so for me (not sure about the rest), it would make sense to block this country from a firewall standpoint and block it from the workstation. I know PaloAlto, Juniper, Extremenetworks and others give you this capability but I am not sure of other solutions provide this capability.

I have done this with my Windows servers running powershell scripts:

2.144.0.0/255.255.0.0

to (IRAN Addresses, they have to be listed by subnet and not by range, there are about 2725 addresses (at least what I have found)

217.218.0.0/255.254.0.0

There are listings of IRAN IP CIDR blocks, as a precaution, block the addresses mentioned. This could at least help address some of the issues.

Just a word to the wise.

Todd

 

 
AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16317
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can trigger execution of a .phar file via a phar:// URL in a filename parameter, because PHAR uploads are not blocked and are reachable within the phar://../../../../../../../../var/www/html/web/var/assets/ directory, a different vulnerabi...
CVE-2019-16318
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can bypass file-extension restrictions via a 256-character filename, as demonstrated by the failure of automatic renaming of .php to .php.txt for long filenames, a different vulnerability than CVE-2019-10867 and CVE-2019-16317.
CVE-2019-16307
PUBLISHED: 2019-09-14
A Reflected Cross-Site Scripting (XSS) vulnerability in the webEx module in webExMeetingLogin.jsp and deleteWebExMeetingCheck.jsp in Fuji Xerox DocuShare through 7.0.0.C1.609 allows remote attackers to inject arbitrary web script or HTML via the handle parameter (webExMeetingLogin.jsp) and meetingKe...
CVE-2019-16294
PUBLISHED: 2019-09-14
SciLexer.dll in Scintilla in Notepad++ (x64) before 7.7 allows remote code execution or denial of service via Unicode characters in a crafted .ml file.
CVE-2019-16309
PUBLISHED: 2019-09-14
FlameCMS 3.3.5 has SQL injection in account/login.php via accountName.