Source |
Mandiant |
Identifiant |
8377811 |
Date de publication |
2014-11-21 19:36:00 (vue: 2023-09-01 14:42:17) |
Titre |
Opération Double Tap Operation Double Tap |
Texte |
apt3 (également connu sous le nom d'UPS), les acteurs responsables de Operation Clandestine Fox a tranquillement continué à envoyer des vagues de messages de spearphish au cours des derniersmois.Cet acteur a lancé sa dernière campagne le 19 novembre 2014 ciblant plusieurs organisations.L'attaquant a exploité plusieurs exploits, ciblant les deux CVE-2014-6332 et CVE-2014-4113 .Le CVE-2014-6332 a été divulgué publiquement le 2014-2011-11 et est une vulnérabilité d'exécution de code à distance de tableau d'automatisation Windows Ole.CVE-2014-4113 est une vulnérabilité d'escalade privilégiée qui était divulgué publiquement le 2014-10-14 .
l'utilisation de cve
APT3 (also known as UPS), the actors responsible for Operation Clandestine Fox has quietly continued to send waves of spearphishing messages over the past few months. This actor initiated their most recent campaign on November 19, 2014 targeting multiple organizations. The attacker leveraged multiple exploits, targeting both CVE-2014-6332 and CVE-2014-4113. CVE-2014-6332 was disclosed publicly on 2014-11-11 and is a Windows OLE Automation Array Remote Code Execution vulnerability. CVE-2014-4113 is a privilege escalation vulnerability that was disclosed publicly on 2014-10-14.
The use of CVE |
Notes |
★★★★
|
Envoyé |
Oui |
Condensat |
2014 4113 6332 6332 and cve actor actors also apt3 array attacker automation both cve campaign clandestine code continued cve disclosed double escalation execution exploits for operation fox has initiated known leveraged messages months most multiple november ole operation organizations over past privilege publicly quietly recent remote responsible send spearphishing tap targeting ups use vulnerability was disclosed waves windows |
Tags |
Vulnerability
Technical
|
Stories |
APT 3
APT 3
|
Move |
|