Backdoor found in ASEAN defence officials document

Powered by SC Magazine
 

File contains Australian defence officials' phone numbers and email addresses.

Criminals are exploiting interest in the ASEAN Defense Ministers Meetings (ADMM-Plus) to deliver malware to unsuspecting users.

The malware was delivered with a document labelled “ADMM-Plus Defence Officials Directory” that created a backdoor on unpatched machines.

The document itself was benign but contained potentially sensitive phone numbers and email addresses of defence officials from Australia, New Zealand and other members of the Association of South East Asian Nations.

Symantec researcher Takashi Katsuki discovered the document but did not reveal the names contained within it. SC has requested to view the file.

Attackers delivered the document and the payload through a file (.rtf) that exploited a Windows ActiveX remote code execution vulnerability (CVE-2012-0158). Once the file was opened, it dropped the document and the backdoor on machines.

The backdoor loaded after Windows users logged in and contacted a server based in China.

The vulnerability was already patched by Microsoft but had been exploited in a string of malware campaigns since its discovery in April this year.

It has been bound into document files for phishing attacks against Tibetan activists, Japanese steel companies and other industry sectors.               

Copyright © SC Magazine, Australia


Backdoor found in ASEAN defence officials document
Tags
 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 309

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 118

Vote