Executive Summary

Informations
Name TA15-213A First vendor Publication 2015-08-01
Vendor US-CERT Last vendor Modification 2015-08-01
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Overview

Between June and July 2015, the United States Computer Emergency Readiness Team (US-CERT) received reports of multiple, ongoing and likely evolving, email-based phishing campaigns targeting U.S. Government agencies and private sector organizations. This alert provides general and phishing-specific mitigation strategies and countermeasures.


Description


US-CERT is aware of three phishing campaigns targeting U.S. Government agencies and private organizations across multiple sectors. All three campaigns leveraged website links contained in emails; two sites exploited a recent Adobe Flash vulnerability (CVE-2015-5119) while the third involved the download of a compressed (i.e., ZIP) file containing a malicious executable file. Most of the websites involved are legitimate corporate or organizational sites that were compromised and are hosting malicious content.


Impact


Systems infected through targeted phishing campaigns act as an entry point for attackers to spread throughout an organization’s entire enterprise, steal sensitive business or personal information, or disrupt business operations.


Solution


Phishing Mitigation and Response Recommendations



  • Implement perimeter blocks for known threat indicators:

    • Email server or email security gateway filters for email indicators

    • Web proxy and firewall filters for websites or Internet Protocol (IP) addresses linked in the emails or used by related malware

    • DNS server blocks (blackhole) or redirects (sinkhole) for known related domains and hostnames



  • Remove malicious emails from targeted user mailboxes based on email indicators (e.g., using Microsoft ExMerge).

  • Identify recipients and possible infected systems:

    • Search email server logs for applicable sender, subject, attachments, etc. (to identify users that may have deleted the email and were not identified in purge of mailboxes)

    • Search applicable web proxy, DNS, firewall or IDS logs for activity the malicious link clicked.

    • Search applicable web proxy, DNS, firewall or IDS logs for activity to any associated command and control (C2) domains or IP addresses associated with the malware.

    • Review anti-virus (AV) logs for alerts associated with the malware.  AV products should be configured to be in quarantine mode. It is important to note that the absence of AV alerts or a clean AV scan should not be taken as conclusive evidence a system is not infected.

    • Scan systems for host-level indicators of the related malware (e.g., YARA signatures)





  • For systems that may be infected:

    • Capture live memory of potentially infected systems for analysis

    • Take forensic images of potentially infected systems for analysis

    • Isolate systems to a virtual local area network (VLAN) segmented form the production agency network (e.g., an Internet-only segment)



  • Report incidents, with as much detail as possible, to the NCCIC.


Educate Your Users


Organizations should remind users that they play a critical role in protecting their organizations form cyber threats. Users should:



  • Exercise caution when opening email attachments, even if the attachment is expected and the sender appears to be known.  Be particularly wary of compressed or ZIP file attachments.

  • Avoid clicking directly on website links in emails; attempts to verify web addresses independently (e.g., contact your organization’s helpdesk or sear the Internet for the main website of the organization or topic mentioned in the email).

  • Report any suspicious emails to the information technology (IT) helpdesk or security office immediately.


Basic Cyber Hygiene


Practicing basic cyber hygiene would address or mitigate the vast majority of security breaches handled by today’s security practitioners:



  • Privilege control (i.e., minimize administrative or superuser privileges)

  • Application whitelisting / software execution control (by file or location)

  • System application patching (e.g., operating system vulnerabilities, third-party vendor applications)

  • Security software updating (e.g., AV definitions, IDS/IPS signatures and filters)

  • Network segmentation (e.g., separate administrative networks from business-critical networks with physical controls and virtual local area networks)

  • Multi-factor authentication (e.g., one-time password tokens, personal identity verification (PIV cards)


Further Information


For more information on cybersecurity best practices, users and administrators are encouraged to review US-CERT Security Tip: Handling Destructive Malware to evaluate their capabilities encompassing planning, preparation, detection, and response. Another resource is ICS-CERT Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies.


Original Source

Url : http://www.us-cert.gov/cas/techalerts/TA15-213A.html

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 346

Snort® IPS/IDS

Date Description
2016-03-22 Adobe Flash Player remote code execution attempt
RuleID : 37689 - Revision : 1 - Type : FILE-FLASH
2016-03-22 Adobe Flash Player remote code execution attempt
RuleID : 37688 - Revision : 1 - Type : FILE-FLASH
2016-03-14 Adobe Flash Player Exploit Kit decryption key detected
RuleID : 36193 - Revision : 2 - Type : FILE-FLASH
2016-03-14 Adobe Flash Player remote code execution attempt
RuleID : 36152 - Revision : 2 - Type : FILE-FLASH
2016-03-14 Adobe Flash Player remote code execution attempt
RuleID : 36151 - Revision : 2 - Type : FILE-FLASH
2016-03-14 Adobe Flash Player remote code execution attempt
RuleID : 36150 - Revision : 2 - Type : FILE-FLASH
2016-03-14 Adobe Flash Player remote code execution attempt
RuleID : 36149 - Revision : 2 - Type : FILE-FLASH
2016-03-14 Adobe Flash Player remote code execution attempt
RuleID : 36142 - Revision : 2 - Type : FILE-FLASH
2016-03-14 Adobe Flash Player remote code execution attempt
RuleID : 36141 - Revision : 2 - Type : FILE-FLASH
2016-03-14 Adobe Flash Player remote code execution attempt
RuleID : 36140 - Revision : 2 - Type : FILE-FLASH
2016-03-14 Adobe Flash Player remote code execution attempt
RuleID : 36139 - Revision : 2 - Type : FILE-FLASH
2016-03-14 Adobe Flash Player remote code execution attempt
RuleID : 36138 - Revision : 2 - Type : FILE-FLASH
2016-03-14 Adobe Flash Player remote code execution attempt
RuleID : 36137 - Revision : 2 - Type : FILE-FLASH
2016-03-14 Adobe Flash Player remote code execution attempt
RuleID : 36136 - Revision : 2 - Type : FILE-FLASH
2016-03-14 Adobe Flash Player remote code execution attempt
RuleID : 36135 - Revision : 2 - Type : FILE-FLASH
2015-08-11 Adobe Flash Player remote code execution attempt
RuleID : 35096 - Revision : 2 - Type : FILE-FLASH
2015-08-11 Adobe Flash Player remote code execution attempt
RuleID : 35095 - Revision : 2 - Type : FILE-FLASH
2015-08-09 Adobe Flash Player remote code execution attempt
RuleID : 35089 - Revision : 3 - Type : FILE-FLASH
2015-08-09 Adobe Flash Player remote code execution attempt
RuleID : 35088 - Revision : 3 - Type : FILE-FLASH
2015-08-09 Adobe Flash Player remote code execution attempt
RuleID : 35087 - Revision : 3 - Type : FILE-FLASH
2015-08-09 Adobe Flash Player remote code execution attempt
RuleID : 35086 - Revision : 3 - Type : FILE-FLASH

Nessus® Vulnerability Scanner

Date Description
2015-09-23 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201507-13.nasl - Type : ACT_GATHER_INFO
2015-07-13 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1211-1.nasl - Type : ACT_GATHER_INFO
2015-07-13 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1214-1.nasl - Type : ACT_GATHER_INFO
2015-07-10 Name : The remote Windows host contains a web browser that is affected by multiple v...
File : google_chrome_43_0_2357_132.nasl - Type : ACT_GATHER_INFO
2015-07-10 Name : The remote Mac OS X host contains a web browser that is affected by multiple ...
File : macosx_google_chrome_43_0_2357_132.nasl - Type : ACT_GATHER_INFO
2015-07-09 Name : The remote Windows host has a version of Adobe AIR installed that is affected...
File : adobe_air_apsb15-16.nasl - Type : ACT_GATHER_INFO
2015-07-09 Name : The remote Windows host has a browser plugin installed that is affected by mu...
File : flash_player_apsb15-16.nasl - Type : ACT_GATHER_INFO
2015-07-09 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_348bfa6925a211e5ade10011d823eebd.nasl - Type : ACT_GATHER_INFO
2015-07-09 Name : The remote Mac OS X host has a version of Adobe AIR installed that is affecte...
File : macosx_adobe_air_apsb15-16.nasl - Type : ACT_GATHER_INFO
2015-07-09 Name : The remote Mac OS X host has a browser plugin installed that is affected by m...
File : macosx_flash_player_apsb15-16.nasl - Type : ACT_GATHER_INFO
2015-07-09 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-473.nasl - Type : ACT_GATHER_INFO
2015-07-09 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2015-1214.nasl - Type : ACT_GATHER_INFO
2015-07-09 Name : The remote Windows host has a browser plugin installed that is affected by mu...
File : smb_kb3065823.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2015-08-02 05:26:44
  • First insertion