[B](http://www.twitter.com/volexity) [M](http://www.volexity.com/blog/?feed=rss2) Incident Response & Suppression [Home](http://www.volexity.com/blog/) # APT Group Wekby Leveraging Adobe Flash Exploit (CVE-2015-5119) [Posted on July 8, 2015 by Steven Adair](http://www.volexity.com/blog/?p=158) [As if the recent breach and subsequent public data dump involving the Italian company Hacking Team wasn’t bad](http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html) enough, it all gets just a little bit worse. Emerging from the bowels of Hacking Team data dump was a Flash 0-day [exploit (CVE-2015-5119) that was just patched today by Adobe as covered in APSB15-16. The exploit has since been](https://helpx.adobe.com/security/products/flash-player/apsb15-16.html) [added into the Angler Exploit Kit and integrated into Metasploit. However, not to be out done, APT attackers have](http://malware.dontneedcoffee.com/2015/07/hackingteam-flash-0d-cve-2015-xxxx-and.html) also started leveraging the exploit in targeted spear phishing attacks as well. Before we start dishing the details, there is going to be one main takeaway from this blog post: If you haven’t already, update/patch your Adobe Flash now. ## Spear Phishing This morning, a well known APT threat group, often referred to as Wekby, kicked off a rather ironic spear phishing campaign. The attackers launched spoofed e-mail messages purporting to be from Adobe. The e-mail messages references an Adobe Flash update and encourage the recipients to click a link to download and install the update. Take a look at an example of the spear phish e-mail message below. ----- The visible and spoofed source e-mail address for “Andre Vangils” is avangils@adobe.com. This is not a particularly advanced spear phish message. However, the visible link http://get.adobe.com, as you have likely guessed, does not actually go to Adobe’s website. Instead it leads to index.htm on an IP address belonging to a hosting provider named PEG TECH INC. This page is far less helpful than one would hope. Instead of providing a legitimate Adobe Flash update, the page loads a malicious SWF file instead. The following contents are found from the HTML page from the link: