img20170412103417100717792orig
Security

Microsoft Word exploit linked to cyberspying in Ukraine conflict

A previously unknown Microsoft Office vulnerability was recently used to deliver spyware to Russian-speaking targets, in a possible case of cyberespionage.

Security firm FireEye noticed the intrusion attempt, which taps a critical software flaw that hackers are using to craft malicious Microsoft Word documents.

On Wednesday, FireEye said it uncovered one attack that weaponized a Russian military training manual. Once opened, the malicious document will deliver FinSpy, a surveillance software that’s been marketed to governments.

It’s unclear who the document was targeting. However, it appears to have been published in the Donetsk People’s Republic, a breakaway region in Ukraine that’s received Russian support.

FinSpy, also known as FinFisher, is developed by a subsidiary of Gamma Group, a European firm that specializes in surveillance and monitoring equipment. Thirty-three governments have been suspected of using the firm's spyware, according to a 2015 investigation from Citizen Lab.     

FireEye said the malicious Russian training manual can download additional malware payloads to the victim’s computer, along with another fake document claiming to be a Russian decree approving a forest management plan.   

The attack appears to have occurred this January, months before Microsoft became aware of the vulnerability. Given that Gamma Group probably has a long list of government customers, FireEye suspects other parties may have hacked targets in the same way, using FinSpy.

It’s also possible that knowledge about the Microsoft vulnerability may have been circulated in the hacking community.

In March, a separate attack was found using the vulnerability but instead to deliver malware that’s been involved in financial crimes.

However, FireEye said that both this attack and the intrusion attempt against Russian-speaking targets share similar code. This suggests different hacking groups may have gotten information about Microsoft vulnerability from the same source.

Fortunately, Microsoft on Tuesday issued a patch to fix the flaw. Security researchers warn that opening email attachments remain a major source of malware infections. 

IDG Insider

PREVIOUS ARTICLE

« Lenovo's 14-inch Flex 4 is $280 right now

NEXT ARTICLE

Google Photos brings electronic stabilization to your old and shaky family videos »
author_image
IDG News Service

The IDG News Service is the world's leading daily source of global IT news, commentary and editorial resources. The News Service distributes content to IDG's more than 300 IT publications in more than 60 countries.

  • Mail

Recommended for You

Trump hits partial pause on Huawei ban, but 5G concerns persist

Phil Muncaster reports on China and beyond

FinancialForce profits from PSA investment

Martin Veitch's inside track on today’s tech trends

Future-proofing the Middle East

Keri Allan looks at the latest trends and technologies

Poll

Do you think your smartphone is making you a workaholic?