<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Microsoft Equation Editor Exploit in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Microsoft-Equation-Editor-Exploit/m-p/25939#M1592</link>
    <description>&lt;P&gt;&lt;SPAN&gt;There is a new cyberattack campaign using malicious RTF documents that has been targeting government IT agencies in Eastern Asia, according to research published today by&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.proofpoint.com/us" target="_self"&gt;Proofpoint&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Dubbed Operation LagTime IT,&amp;nbsp;the malicious documents delivers custom Cotx RAT malware to tech agencies responsible for overseeing government network infrastructures. Proofpoint has attributed&amp;nbsp;the campaign to the Chinese threat group known as TA428. Researchers believe the likely motivation is conducting espionage on capabilities like 5G&amp;nbsp;and establishing a beachhead for future attacks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Proofpoint determined that the infection vector observed in the campaign was spear phishing, with emails originating from both free email accounts and compromised user accounts. Attackers relied on Microsoft Equation Editor exploit&amp;nbsp;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2018-0798" target="_blank"&gt;CVE-2018-0798&lt;/A&gt;&amp;nbsp;to deliver a custom malware.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:16:50 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2023-10-09T09:16:50Z</dc:date>
    <item>
      <title>Microsoft Equation Editor Exploit</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Microsoft-Equation-Editor-Exploit/m-p/25939#M1592</link>
      <description>&lt;P&gt;&lt;SPAN&gt;There is a new cyberattack campaign using malicious RTF documents that has been targeting government IT agencies in Eastern Asia, according to research published today by&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.proofpoint.com/us" target="_self"&gt;Proofpoint&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Dubbed Operation LagTime IT,&amp;nbsp;the malicious documents delivers custom Cotx RAT malware to tech agencies responsible for overseeing government network infrastructures. Proofpoint has attributed&amp;nbsp;the campaign to the Chinese threat group known as TA428. Researchers believe the likely motivation is conducting espionage on capabilities like 5G&amp;nbsp;and establishing a beachhead for future attacks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Proofpoint determined that the infection vector observed in the campaign was spear phishing, with emails originating from both free email accounts and compromised user accounts. Attackers relied on Microsoft Equation Editor exploit&amp;nbsp;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2018-0798" target="_blank"&gt;CVE-2018-0798&lt;/A&gt;&amp;nbsp;to deliver a custom malware.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:16:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Microsoft-Equation-Editor-Exploit/m-p/25939#M1592</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T09:16:50Z</dc:date>
    </item>
  </channel>
</rss>

