Tuesday, November 14, 2017

Office DDE feature exploited to deliver DNSMessenger payload in new targeted phishing campaign

Figure 19.png

The Research, Analysis, and Intelligence Division (R.A.I.D.) here at PhishLabs interacts with a multitude of malware samples in our day-to-day operations. Occasionally, we come across a campaign that stands out from the rest. One such instance occurred recently when one of our Phishing Threat Monitoring service clients was targeted with DNSMessenger, a sophisticated, memory-based infection technique, which has been previously associated with a financially-motivated Advanced Persistent Threat (APT) actor group. Also notable is the delivery method – the increasingly popular Dynamic Data Exchange (DDE) protocol Office document attack. This delivery method has recently been adopted by actors ranging from nation-state APTs to spammers peddling downloaders and ransomware. In this article, we will examine this delivery vector and dissect the initial DNSMessenger payload.

The post Office DDE feature exploited to deliver DNSMessenger payload in new targeted phishing campaign appeared first on Security Boulevard.



from Office DDE feature exploited to deliver DNSMessenger payload in new targeted phishing campaign

No comments:

Post a Comment