An advanced cyber-espionage network targeting high-profile organizations and governments has recently been unveiled. The main attack method being used in this campaign is spear phishing.
The spear phishing emails contain Word document or Excel spreadsheet attachments that exploit three known vulnerabilities in order to compromise computers. The vulnerabilities used are:
CSO Perspectives Roadshow 2016 - International Keynote Robert Lentz, President, Cyber Security Strategies & CISO former US Department of Defense
CSO Perspectives Roadshow 2016 - International Keynote Graham Cluley, Security Analyst, GrahamCluley.com
CSO Perspectives Roadshow 2016 - Panel Session - Scrambling the golden egg: Why you must encrypt and why the government doesn't want you to
CSO Perspectives Roadshow Melbourne Show Reel 22nd March 2016, Crown
CSO Perspectives Roadshow 2016 - Security Awareness - Erica Hardinge, ANZ & Simone Bachmann, Australia Post