Xtreme rat 3.5 private2/12/2023 The Word files contain a macro to load an embedded SWF Flash object. It is interesting to note that even though the contents of Word files are in English, the codepage of Word files are “Windows Simplified Chinese (PRC, Singapore)”. We have identified two unique word files containing CVE-2013-0634 so far. We will examine the payload executed as a part of this threat in the wild. It is highly recommended that you apply this patch right away, as this threat is active in the wild. The two exploits have been assigned CVE-2013-0633 and CVE-2013-0634. They have also released an advisory with details on versions and platforms affected along with applicable patches. Adobe PSIRT has released information about this threat here. FireEye Labs identified the exploit in the wild on February 5, 2013, which based on the compile time and document creation time is the same day the malicious payload was generated. By now you have probably heard of the new zero-day exploit in Adobe Flash that was patched today.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |