Cisco Blog >Threat Research

Threat Research

This post authored by David Maynor & Paul Rascagneres with the contribution of Alex McDonnell and Matthew Molyett

[Attachment]

Overview

Talos has identified a malicious Microsoft Word document with several unusual features and an advanced workflow, performing reconnaissance on the targeted system to avoid sandbox detection and virtual analysis, as well as exploitation from a non-embedded Flash payload. This document targeted NATO members in a campaign during the Christmas and New Year holiday. Due to the file name, Talos researchers assume that the document targeted NATO members governments. This attack is also notable because the payload was swapped out with a large amount of junk data which was designed to create resource issues for some simplistic security devices.

Read More

Tags:

Cisco Systems Inc. published this content on 27 January 2017 and is solely responsible for the information contained herein.
Distributed by Public, unedited and unaltered, on 27 January 2017 21:30:07 UTC.

Original documenthttp://blogs.cisco.com/security/talos/matryoshka-doll-reconnaissance-framework

Public permalinkhttp://www.publicnow.com/view/310CFCCD1B70C8B867AE3A84D5333638333D3E8F