Used to compromise organizations in the USA and Canada. First attacks were detected in 08.03.2016.
PUNCHBABY or PUNCHTRACK Trojan.
Vulnerable component: Windows
CVSSv3 score: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists due to improper handling of objects in memory by the kernel-mode driver. A local attacker can run a specially crafted program, gain elevated privileges and execute arbitrary code with SYSTEM privileges.
Successful exploitation of this vulnerability may result in arbitrary code execution on the vulnerable system.
Note: the vulnerability was being actively exploited.
Known APT campaigns:
PUNCHTRACK - companies in USA and Canada
According to FireEye hackers used malware тАЬPUNCHTRACKтАЭ to steal usersтАЩ credit card data.
Latest references in media:
- Cyber-criminal Tactics Get Incredibly Sophisticated [2017-03-14 22:20:08]
Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.