FYI...
CEIEC doc exploits ...
-
http://www.shadowser...lendar/20120416
16 April 2012 - "In recent weeks thousands documents have been released online by a hacktivist going by the online moniker of "Hardcore Charlie." These documents appear to have potentially been sourced and possibly stolen from various businesses and governments in different countries including the United States, the Philippines, Myanmar, Vietnam, and others... the documents are purported to have been stolen by Hardcore Charlie from the Beijing based military contractor China National Import & Export Corp (CEIEC). If true, that would mean that the documents were stolen at least twice. These are allegations that CEIEC has strongly denied and condemned... one thing we do have are words of caution and some interesting information about a handful of the documents found in this dump. Within the document dump in a folder related to Vietnam are
11 malicious documents (8 unique) that exploit vulnerabilities (CVE-2010-3333 and CVE-2009-3129) in Microsoft Office to
install malware. These documents installed four different types of backdoors that reported back to six distinct command and control servers. Two of the backdoors were unfamiliar two us and the other two were the well known
Poison Ivy RAT and the
Enfal/Lurid. At least one hostname could be tied back to a known set of persistent actors engaged in cyber espionage... At the time of this writing... hosts names resolve to
123.120.105.120...
112.112.147.16 and
222.172.238.174... The single Microsoft Excel exploit in the packet dropped malware that beaconed back to
64.56.70.254 and likely a variety of other embedded IP addresses... Two out of the nine unique samples installed the popular
Poison Ivy RAT upon successful exploitation... Although many questions remain, the following facts are clear:
• A small subset of the documents contained in the purported CEIEC dump
are malicious.
• These malicious
documents drop a mix of malware families including Poison Ivy, Enfal/Lurid and two unnamed families.
• Some of the malware samples extracted from the CEIEC dump
connect to infrastructure used in previous APT campaigns.
These documents just go to show that malicious files can end up pretty much anywhere. We are stating the obvious but remember to exercise caution when viewing files you downloaded from the Internet. Microsoft patched the two vulnerabilities used in these attacks quite some time ago. They patched CVE-2009-3129 with MS09-067 and CVE-2010-3333 with MS10-087. Malicious documents that exploit vulnerabilities in Microsoft Office, Adobe Acrobat [Reader], or components loaded by these pieces of software are still some of the most common ways in which cyber espionage attacks are conducted. Staying current with the latest versions and security patches for any software you run is
highly recommended."