- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
The Korean CERT published a security advisory on January 31 regarding a new Adobe Flash Player zero-day vulnerability (CVE-2018-4878). On February 6th, Adobe released a patch and security bulletin to address this vulnerability. The vulnerability is a Use-After-Free (UAF) bug in Adobe tvsdk. The final goal is allegedly to download and execute a malware known as DogCall (aka ROKRAT) – an information stealing backdoor. DogCall is often delivered via malicious Hangul Word Processor (HWP) files, which is a popular application used in South Korea.
Check out the Unit42 blog that illustrates and explains the attack flow:
Palo Alto Networks Traps advanced endpoint protection offers multiple methods of malware and exploit prevention to protect against such complex threats. For this threat, Traps prevents the malicious shellcode running in Excel.exe using Traps exploit prevention capabilities. In addition, Traps local analysis via machine learning prevents the malicious payload from executing.
AutoFocus customers can track this activity via the DogCall tag:
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Subject | Likes |
---|---|
5 Likes | |
4 Likes | |
3 Likes | |
3 Likes | |
3 Likes |
User | Likes Count |
---|---|
13 | |
4 | |
4 | |
3 | |
2 |