<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><img class=" size-full wp-image-2275 aligncenter" src="http://cdn2.hubspot.net/hubfs/2548414/Imported_Blog_Media/patchwork.jpg" alt="Patchwork" width="675" height="450">Patchwork, so dubbed for its use of copy-and-pasted code from various online sources, is a targeted attack focused on obtaining documents from governments and government-affiliated organizations with dealings in Southeast Asia and the South China Sea.&nbsp;According to researchers from <a href="http://www.cymmetria.com">Cymmetria</a>, Patchwork targeted personnel working on military and political assignments worldwide. They suspect that the attackers originate from India.</p> <!--more--><p>The attackers were able to infect their victims using targeted spear-phishing emails with malicious PowerPoint file attachments weaponized with the CVE-2014-4114 vulnerability, nicknamed Sandworm. Once opened, these attachments download and run executables that allow for data exfiltration to a control server, as well as establish persistence in the infected machine. Patchwork is estimated to have infected 2,500 machines since its first recognized infection by researchers in December 2015.</p> <p>It is important to mention that this attack is very simple on the technical side of things – it utilizes a vulnerability that was patched long ago and uses mostly open source code that is widely available online for everyone to grab. And yet, this campaign has managed to infect so many. “This group shows how low the bar has been moved for a successful APT attack to take flight,” said Gadi Evron CEO and founder of Cymmetria to <a href="https://threatpost.com/apt-group-patchwork-cuts-and-pastes-a-potent-attack/119081/">threatpost.com</a>. “We are impressed that these attacks were able to infiltrate high-end organizations given the apparent low technical aptitude of the attackers”.</p> <p>The vulnerability used in this attack was patched by Microsoft back in 2014, which only highlights the need of preforming regular system updates.</p> <p>ThreatSTOP customers are protected from Patchwork.</p></span>