Flash Exploit CVE-2018-4878 Detected in Malicious Email Campaign

NJCCIC Alert

Original Release Date: 2018-03-02

Morphisec Labs detected several malicious Microsoft Word documents exploiting the Flash vulnerability CVE-2018-4878 in a malicious email campaign that bypassed many existing scanning solutions. The documents were downloaded from the safe-storage[.]biz domain and went almost entirely undetected with a 1/67 detection ratio. Victims received short links to the malicious website generated by the Google URL Shortener, giving security researchers the ability to see the analytics for the shortened links. After downloading and opening the Word document, the attack exploits the Flash vulnerability and opens a command prompt that is injected with a malicious shellcode designed to establish a connection with the malicious domain. The shellcode then downloads a “m.db” dll from the same domain which is executed using the regsvr32 process to bypass whitelisting solutions. The NJCCIC recommends applying the patch released by Adobe in early February and reviewing Mosphisec’s blog for additional information and IoCs.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.