November 30, 2017 By Larry Loeb 2 min read

Researchers have found evidence that the financially focused Cobalt cybercriminal group exploited a 17-year-old Microsoft Office cybersecurity vulnerability (CVE-2017-11882) in its latest campaign. The vulnerability, which comes from Office’s Equation Editor, allows buffer overflows to be created when the editor is fed specially crafted files. These can then lead to remote code execution.

Microsoft patched the vulnerability in November. However, the manner in which it was patched led some to believe that the original Equation Editor code was not available to the coders building the patch.

How the Cybersecurity Vulnerability Gets Exploited

In any case, it didn’t take long for someone to try to exploit the vulnerability. There were proof-of-concept exploits released just after the vulnerability was discovered, so it was just a matter of time until some fast-acting cybercriminal tried it in the wild.

ReversingLabs found a rich text format (RTF) document that was set up just to exploit this cybersecurity vulnerability. The file would contact a remote server for a first-stage payload and then execute it. This first-stage executable then connected to the remote server and obtains a second-stage payload.

The second-stage payload is a script that contains an embedded, final payload, which is the Cobalt Strike backdoor. This comes in 32-bit or 64-bit DLL form depending on the victim’s system architecture and is what allows the Cobalt group to execute its own code on the system.

Cobalt Has a History

Cobalt has been on the radar since 2016. The group typically focuses its attacks on financial targets such as banks, exchanges, insurance companies and investment funds.

In the past, Cobalt has used phishing emails to distribute its malware to victims. A poisoned RTF file used as an infection method is within the boundaries of how the group usually functions.

The group has been best known for executing attacks on Eastern Europe as well as Central and Southeast Asia locations, but have now expanded to attacks all over the world.

Once again, the age-old advice against opening unverified attachments to messages from unknown senders serves as a potent defense against these kinds of attacks.

More from

How cyber criminals are compromising AI software supply chains

3 min read - With the adoption of artificial intelligence (AI) soaring across industries and use cases, preventing AI-driven software supply chain attacks has never been more important.Recent research by SentinelOne exposed a new ransomware actor, dubbed NullBulge, which targets software supply chains by weaponizing code in open-source repositories like Hugging Face and GitHub. The group, claiming to be a hacktivist organization motivated by an anti-AI cause, specifically targets these resources to poison data sets used in AI model training.No matter whether you use…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Getting “in tune” with an enterprise: Detecting Intune lateral movement

13 min read - Organizations continue to implement cloud-based services, a shift that has led to the wider adoption of hybrid identity environments that connect on-premises Active Directory with Microsoft Entra ID (formerly Azure AD). To manage devices in these hybrid identity environments, Microsoft Intune (Intune) has emerged as one of the most popular device management solutions. Since this trusted enterprise platform can easily be integrated with on-premises Active Directory devices and services, it is a prime target for attackers to abuse for conducting…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today