Tracking Turla: ESET researchers discover attack on governmental websites in Armenia

BRATISLAVA, MONTREAL – ESET researchers have found a watering hole operation targeting several high-profile Armenian websites. It relies on a social engineering trick — a fake Adobe Flash update — as a lure to deliver two previously undocumented pieces of malware. In this specific operation, Turla has compromised at least four Armenian websites, including two belonging to the government. Thus, it is likely the targets include government officials and politicians.

Turla is an infamous cyberespionage group active for more than 10 years. Its main targets are government and military organizations. This recent operation bears similarities to the modus operandi of several of Turla’s watering hole campaigns in the past.

ESET Research has indications that these websites had been compromised since at least the beginning of 2019. We notified the Armenian national CERT and shared our analysis with them before publication.

“If the visitor is deemed interesting, the C&C server replies with a piece of JavaScript code that creates an IFrame. Data from ESET telemetry suggests that, for this campaign, only a very limited number of visitors were considered interesting by Turla’s operators,” comments ESET researcher Matthieu Faou on the victims of the attack.

“A fake Adobe Flash update pop-up window warning to the user is displayed in order to trick them into downloading a malicious Flash installer. The compromise attempt relies solely on this social engineering trick,” he adds.

Interestingly, in this latest campaign Turla utilizes a completely new backdoor dubbed PyFlash. ESET believes this is the first time the Turla developers have used the Python language in a backdoor. The command and control server sends backdoor commands that include downloading files, executing Windows commands, and launching or uninstalling malware. “The final payload has changed, probably in order to evade detection,” explains Faou.

For more details about the latest Turla campaign, read the blogpost Tracking Turla: New backdoor delivered via Armenian watering holes on WeLiveSecurity. Make sure to follow ESET research on Twitter for the latest news from ESET Research.


About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

請留意 CVE-2020-0852 與 CVE-2020-0796 漏洞攻擊!

【關於 CVE-2020-0852】

在微軟的 Office Word 中存在一個遠端任意程式碼執行的漏洞,這個漏洞在記憶體未能適當處理物件時可被觸發。攻擊者可特製一個檔案來針對當下的使用者進行攻擊,比方該檔案可利用登入使用者的權限來執行某些動作。

要觸發這個漏洞,被攻擊者要先以存有此漏洞的 Office 版本開啟一個特製的攻擊 Word 文件檔案。用於電子郵件的攻擊場景,攻擊者可直接寄送這個檔案予攻擊目標,再透過社交工程的手法誘騙目標開啟;當然也可以透過誘騙目標點擊惡意超連結,再連接至特製或被入侵的網站,誘騙目標下載並開啟惡意文件。需要特別注意的是:這個漏洞可以透過 Outlook 的預覽面板觸發。

>>詳細漏洞資訊與更新修補檔案,請參考此處


【關於 CVE-2020-0796】

Windows 10 Version 1903, Windows Server Version 1903 (Server Core Installation), Windows 10 Version 1909, 以及 Windows Server Version 1909 與啟用 SMBv3 的 Windows 8 與 Windows Server 2012 皆受本漏洞影響。攻擊者可透過特製的封包攻擊帶有此漏洞並啟用 SMBv3 服務的伺服器,以獲取伺服器的完整控制權。此外,CVE-2020-0796 是可蠕蟲化攻擊的漏洞。

在微軟釋出修補之前,建議使用防火牆功能關閉、限縮 SMBv3 及通訊埠 445 的使用。

>>詳細漏洞資訊與緩和措施,請參考此處

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於中華數位科技 Softnext Technologies Corp.
創立於2000年8月。
秉持著【We Secure Your Content】的服務理念,以提供企業資訊應用管理服務及打造資訊內容安全防護為宗旨。專精於提供網路應用服務技術,根據市場需求推出多款資訊內容安全的解決方案及應用服務,能夠協助企業透過符合資安管理規範並遵循法規的方式進行資訊內容安全管理,以維護員工的生產力、提升企業經營績效。