📜 ⬆️ ⬇️

IE 0day (CVE-2013-3893) and DeputyDog operation

This week we wrote about a discovered 0day vulnerability in the Internet Explorer browser that was used in the targeted attack. Later, FireEye specialists published details of the investigation of this attack, which indicates that the attacker's targets were in Japan, while the attackers themselves had the same infrastructure that was used in the Bit9 compromise . This operation was named “DeputyDog” and was used to install malware using an appropriate exploit.

ESET antivirus products detect this exploit as Win32 / Exploit.CVE-2013-3893.A .

')

Source: https://habr.com/ru/post/194700/


All Articles