New backdoor 'Baccamun' spreads through ActiveX exploit

Share this article:

Attackers using a newly discovered backdoor program, called “Baccamun,” are spreading the malware via an ActiveX exploit, researchers revealed.

The remote code execution flaw (CVE-2012-0158) used for exploitation has been noted by other researchers as being a bug of choice in hacker arsenals. Last month, Trend Micro named the Microsoft vulnerability the most commonly exploited flaw related to targeted attacks in the last half of 2013, despite the fact that a patch had been issued more than two years ago.

In a Friday blog post, Symantec said that hackers recently targeted a Korean organization with Baccamun by exploiting CVE-2012-0158. In one attack, the group (believed to be operating in East Asia) disguised a malicious document as an invite for a free car inspection to employees.

The RTF document instead installed Baccamun, which is capable of terminating users' processes, downloading files and executing arbitrary commands, Symantec said.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters


More in News

EPIC: driver data shared via V2V technology needs protection

The groups shared comments on V2V communications with the National Highway Traffic Safety Administration.

Researchers observe recently patched Adobe bug added to exploit kits

Researchers have indicated that a recently patched integer overflow in Adobe Flash Player has been added to exploit kits.

SEDNIT malware delivered in 'Operation Pawn Storm'

SEDNIT malware delivered in 'Operation Pawn Storm'

Military, governments and media from around the world are targets in a campaign identified by Trend Micro.