![chessmaster 10 code chessmaster 10 code](http://plus4world.powweb.com/dl/screenshots/c/chessmaster_2000_01.gif)
NET framework to download additional malware. When we tracked ChessMaster back in November, we noted that it exploited the SOAP WSDL parser vulnerability CVE-2017-8759 (patched in September 2017) within the Microsoft. However, there is a change in the exploit document. 安倍再任(re-appointment of Prime Minister Abe).The email title and attached file name were written in Japanese and contain general business, political, and economy-themed phrases such as Infection Chain for the current ChessMaster campaignĬhessMaster’s current iteration starts off with the familiar phishing attacks seen in the earlier campaigns that involved the use of an email with an attached malicious document using the doc, docx, rtf, csv and msg formats. Spear-phishing emails containing decoy documents exploiting CVE-2017-11882, DDEAUTO, Microsoft Office Frameset and Link auto updateįigure 1.Spear-phishing emails containing decoy documents exploiting CVE-2017-8759.Malicious shortcut (LNK) files and PowerShell.Spear-phishing emails containing decoy documents.In this blog post, we analyze ChessMaster's current status, including the updated tools in its arsenal - with a particular focus on the evolution of ANEL and how it is used in the campaign.
![chessmaster 10 code chessmaster 10 code](https://m.media-amazon.com/images/I/51JMKPM1VVL.jpg)
While the original campaign was comprehensive and used remote access Trojans (RATs) such as ChChes and RedLeaves, this new campaign used a new backdoor (Detected by Trend Micro as BKDR_ANEL.ZKEI) that leverages the CVE-2017-8759 vulnerability for its cyberespionage activities. The threat group used a variety of attack tools and techniques to spy on their target organizations.īack then, we noted that ChessMaster's sophisticated nature implied that the campaign could evolve, before finding changes in the tools and tactics used in the campaign a few months later. At the time, we found ChessMaster targeting different sectors from the academe to media and government agencies in Japan. Trend Micro discovered the ChessMaster campaign back in July 2017 as part of our monitoring efforts to protect our customers.