{"id":5681,"date":"2016-06-17T15:16:28","date_gmt":"2016-06-17T15:16:28","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5681"},"modified":"2020-12-22T11:50:22","modified_gmt":"2020-12-22T16:50:22","slug":"operation-daybreak","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/operation-daybreak\/5681\/","title":{"rendered":"Operation Daybreak: A brand-new zero-day exploit in Flash"},"content":{"rendered":"<p>Securelist just released a new cyberespionage campaign alert, code-named \u201cOperation Daybreak.\u201d We believe the campaign, which employs a previously unknown Adobe Flash Player exploit, was launched by an attack group code-named ScarCruft.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Operation Daybreak: A brand-new zero-day #exploit in #Flash<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FmaC9&amp;text=Operation+Daybreak%3A+A+brand-new+zero-day+%23exploit+in+%23Flash\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Operation Daybreak targets a number of very diverse entities ranging from government organizations to large enterprises. Among them are: one of the largest trading companies in Asia, a mobile advertising and app monetization company from the United States, and a restaurant located in one of the top malls in Dubai. Some of them were compromised over the last few days. This indicates the attackers are still active and the operation will continue for at least some time.<\/p>\n<p>The targets appear to receive a malicious link (via spear-phishing e-mails) that points to a hacked website that hosts the exploit kit. The exact attack vector remains unknown, however.<\/p>\n<p>Costin Raiu, from Kaspersky Lab\u2019s Global Research and Analysis Team (GReAT), and Anton Ivanov, our senior malware analyst, say that ScarCruft\u2019s activities stand out in certain ways. For example, the exploit for CVE-2016-0147 uses \u201ca few very interesting evasion methods.\u201d The Daybreak attacks also cleverly use a bug in the Windows DDE component to bypass security solutions, a method unseen before now. The flaw has been reported to Microsoft\u2019s security team.<\/p>\n<p><strong>Detection and mitigation<\/strong><\/p>\n<p>Kaspersky Lab\u2019s products detect this Flash exploit as HEUR:Exploit.SWF.Agent.gen. Our AEP (Automatic Exploit Prevention) component can successfully detect this attack as well. Payloads are detected as HEUR:Trojan.Win32.ScarCruft.gen.<\/p>\n<p>Securelist says that in-the-wild Flash Player exploits are becoming rare because in most cases they need to be coupled with a sandbox-bypass exploit, which makes them rather tricky. Further, Adobe, along with its plans to drop Flash support soon, is still implementing new mitigations to make exploitation of Flash Player more and more difficult.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Multilayered #security makes attacks too expensive for criminals.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FmaC9&amp;text=Multilayered+%23security+makes+attacks+too+expensive+for+criminals.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>In the meantime, resourceful threat actors such as ScarCruft are deploying zero-day exploits against their high-profile targets, and will continue to do so in the future.<\/p>\n<p>The best option for businesses to avoid becoming victims is to employ a multilayered approach. A combination of traditional antimalware technologies with patch management, host intrusion detection, and, ideally, allowlists and default-deny strategies, is the optimal course of action here.<\/p>\n<p>\u201cWhile it\u2019s impossible to achieve 100% protection, in practice and most cases all you have to do is increase your defenses to the point where it becomes too expensive for the attacker \u2014 who will just give up and move on to other targets,\u201d Costin Raiu and Anton Ivanov wrote.<\/p>\n<p>For full technical details and indicators of compromise, please <a href=\"https:\/\/securelist.com\/blog\/research\/75100\/operation-daybreak\/?utm_medium=blg&amp;utm_source=kb_post_160617&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener\">refer to Securelist<\/a>.<\/p>\n<p>More information about the ScarCruft APT group is available to customers of\u00a0<a href=\"https:\/\/www.kaspersky.com\/advert\/enterprise-security\/apt-intelligence-reporting?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Intelligence Reporting Service<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Securelist just released a new cyberespionage campaign alert, code-named &#8220;Operation Daybreak.&#8221;<\/p>\n","protected":false},"author":209,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[1343,499,2428,2429],"class_list":{"0":"post-5681","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-business","7":"category-smb","8":"tag-0days","9":"tag-apt","10":"tag-daybreak","11":"tag-scarcruft"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/operation-daybreak\/5681\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/operation-daybreak\/5681\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/operation-daybreak\/5681\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5681"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5681\/revisions"}],"predecessor-version":[{"id":38180,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5681\/revisions\/38180"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}