November 30, 2017 By Larry Loeb 2 min read

Researchers have found evidence that the financially focused Cobalt cybercriminal group exploited a 17-year-old Microsoft Office cybersecurity vulnerability (CVE-2017-11882) in its latest campaign. The vulnerability, which comes from Office’s Equation Editor, allows buffer overflows to be created when the editor is fed specially crafted files. These can then lead to remote code execution.

Microsoft patched the vulnerability in November. However, the manner in which it was patched led some to believe that the original Equation Editor code was not available to the coders building the patch.

How the Cybersecurity Vulnerability Gets Exploited

In any case, it didn’t take long for someone to try to exploit the vulnerability. There were proof-of-concept exploits released just after the vulnerability was discovered, so it was just a matter of time until some fast-acting cybercriminal tried it in the wild.

ReversingLabs found a rich text format (RTF) document that was set up just to exploit this cybersecurity vulnerability. The file would contact a remote server for a first-stage payload and then execute it. This first-stage executable then connected to the remote server and obtains a second-stage payload.

The second-stage payload is a script that contains an embedded, final payload, which is the Cobalt Strike backdoor. This comes in 32-bit or 64-bit DLL form depending on the victim’s system architecture and is what allows the Cobalt group to execute its own code on the system.

Cobalt Has a History

Cobalt has been on the radar since 2016. The group typically focuses its attacks on financial targets such as banks, exchanges, insurance companies and investment funds.

In the past, Cobalt has used phishing emails to distribute its malware to victims. A poisoned RTF file used as an infection method is within the boundaries of how the group usually functions.

The group has been best known for executing attacks on Eastern Europe as well as Central and Southeast Asia locations, but have now expanded to attacks all over the world.

Once again, the age-old advice against opening unverified attachments to messages from unknown senders serves as a potent defense against these kinds of attacks.

More from

Hive0137 and AI-supplemented malware distribution

12 min read - IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. Nominated by X-Force as having the “Most Complex Infection Chain” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today