Connecting to LinkedIn...



Microsoft Zero Day Traced to Russian ‘Sandworm’ Hackers

15/10/2014 by


Threat intelligence firm iSight Partners has announced the discovery of a new remote code execution zero day vulnerability affecting all supported versions of Microsoft Windows, Server 2008 and 2012, and linked to a Russian espionage group known as "Sandworm."

The vulnerability, CVE-2014-4114, was discovered by iSight at the beginning of September in spear-phishing attacks from “Sandworm Team” using a weaponized PowerPoint attachment, the firm said in a blog post.

It will be patched in today’s monthly security update from Microsoft.

The flaw exists in the in the “OLE package manager” in Windows and Microsoft Server, allowing an attacker to remotely execute arbitrary code if they can convince a victim to open a specially crafted file via social engineering techniques.

“The vulnerability exists because Windows allows the OLE packager (packager .dll) to download and execute INF files,” the firm explained.

“In the case of the observed exploit, specifically when handling Microsoft PowerPoint files, the packagers allows a Package OLE object to reference arbitrary external files, such as INF files, from untrusted sources. This will cause the referenced files to be downloaded in the case of INF files, to be executed with specific commands.”

The threat intelligence firm said it has been working with Microsoft to monitor the use of the vulnerability and work on a patch, and added that it appears to have been used only by the Sandworm group.

The group itself has been referenced in the past by ESET and F-Secure (which named it “Quedagh”) in relation to BlackEnergy attacks on various entities in Eastern Europe and elsewhere.

This article has been extracted from, please click on this link to read the article in full

Montash is a multi-award winning, global IT recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy & Technologies, Demand IT and Business Engagement, Digital and E-commerce, Leadership Talent, Infrastructure and Service Delivery, Project and Programme Delivery.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News


Humans remain largest security flaw in cloud ...

2016-10-21 14:00:00 +0100

With a vast number of companies moving some, if not all, of their operations to the cloud, security continues to be of major concern. Whilst there are numerous patches and firewalls to safeguard defences, it has been highlighted that the most difficult area to protect against is human interaction. This is the view of Jamie Woodruff, a penetration tester and ethical hacker. Woodruff’s views come after he was contracted to conduct a penetration test in or...


Offshore exploration providing boost for oil ...

2016-10-19 09:00:00 +0100

The oil and gas industry has had a notoriously challenging time of late, with the prices of oil plummeting and causing many firms to tighten their belts. However, offshore exploration is providing a much-needed bright spot for the sector, with an increasing number of governments becoming more accommodating. In the past week, it has been revealed that there are big changes afoot for Brazil’s petroleum laws. Shell has already begun to move on this opportu...