{"id":6292,"date":"2016-11-23T09:05:10","date_gmt":"2016-11-23T14:05:10","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=6292"},"modified":"2020-04-10T14:48:55","modified_gmt":"2020-04-10T18:48:55","slug":"inpage-exploit","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/inpage-exploit\/6292\/","title":{"rendered":"An unusual exploit for Asian banks"},"content":{"rendered":"<p>In September 2016, <a href=\"https:\/\/securelist.com\/blog\/research\/76717\/inpage-zero-day-exploit-used-to-attack-financial-institutions-in-asia\/?utm_medium=blg&amp;utm_source=sl_post_161123&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener\">we detected a number of attacks<\/a> aimed at targets located in Africa and Asia. Among the victims were government agencies and several banks. All of them were attacked using a zero-day exploit for InPage \u2013 a software suit to work with texts in Farsi, Urdu, Pushtu and Arabic \u2013 sent in via e-mails.<\/p>\n<p>The malicious e-mails sent to targets in Myanmar, Sri-Lanka and Uganda bore several infected documents in various formats \u2013 Word (.doc, .docx) and InPage (.inp). Word exploits are well-known and won\u2019t run in the recently updated software environment, while InPage exploit works fine even in the latest version of the software.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The first #zero-day #exploit for InPage text processor had been used in attacks on Asian banks. #infosec #0day<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FaMC5&amp;text=The+first+%23zero-day+%23exploit+for+InPage+text+processor+had+been+used+in+attacks+on+Asian+banks.+%23infosec+%230day\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Interestingly, it\u2019s the first exploit for InPage ever detected. Kaspersky Lab\u2019s software detect the built-in shellcode and identify this malware as HEUR:Exploit.Win32.Generic.<\/p>\n<p>That\u2019s not the first time when vulnerabilities in the locally popular software is being exploited. Another outstanding example was an exploit for Hangul Word Processor (a South-Korean text processor), deployed during <a href=\"https:\/\/securelist.com\/blog\/research\/57331\/the-icefog-apt-a-tale-of-cloak-and-three-daggers\/?utm_medium=blg&amp;utm_source=sl_post_161123&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener\">the Icefog campaign<\/a>.<\/p>\n<p>Using a narrowly specialized software only used in certain industries allows to focus the attack even narrower; the perpetrators thus have more control over the malicious campaign. In the case of InPage, these are organizations include banks and governments.<\/p>\n<p>Unlike zero days in software like Flash or Windows that are patched quickly, exploits for uncommon software suites like InPage can take much longer to patch. The limited use of the software can also mean that discovery of zero days will be long overdue.<\/p>\n<p>Even though the exploited vulnerability still exists, users of Kaspersky Lab\u2019s products are protected thanks to heuristic analysis technology. Still, an approach like this is very unsafe when facing other campaigns, as these exploits stay undetected for years. In order to ensure your safety follow a few of general rules:<\/p>\n<ul>\n<li>Update all software used in a timely manner, operating systems included.<\/li>\n<li>Limit users\u2019 privileges in the OS.<\/li>\n<li>Deploy White Lists and Default Deny approach on critical endpoints.<\/li>\n<li>Use the security software with heuristic analysis and cloud-based file assessment functions available.<\/li>\n<li>Subscribe to professional cybersecurity information services, such as Kaspersky Lab\u2019s APT\u00a0Intelligence Reporting.<\/li>\n<li>Keep your IT security department functional: the modern cybersecurity methods allow to detect even previously unknown threats.<\/li>\n<li>Train your employees in cybersecurity basics: in order to get protected from the intrusion it is often enough that an employee abstains from opening an e-mailed file.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>The first zero-day exploit for InPage text processor had been used in attacks on Asian banks.<\/p>\n","protected":false},"author":611,"featured_media":15288,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[1343,111,2372,1171,2480],"class_list":{"0":"post-6292","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-0days","10":"tag-attacks","11":"tag-exploit","12":"tag-exploits","13":"tag-inpage"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/inpage-exploit\/6292\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/inpage-exploit\/4348\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/inpage-exploit\/6292\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/inpage-exploit\/6292\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/exploits\/","name":"exploits"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/6292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/611"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=6292"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/6292\/revisions"}],"predecessor-version":[{"id":34799,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/6292\/revisions\/34799"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15288"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=6292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=6292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=6292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}