
According to sources, during their attacks on Mitsubishi Electric, Chinese hackers have used a zero-day in the Trend Micro OfficeScan antivirus.
Though Trend Micro has now patched the vulnerability, the company however did not comment if the zero-day was used in other attacks beyond Mitsubishi Electric.
News of the Mitsubishi Electric hack became public on Monday, when in a press release published on its website, the Japanese electronics vendor and defense contractor said it was hacked last year.
After detecting an intrusion on its network on June 28, 2019 and following a month-long investigation, Mitsubishi said it discovered that hackers gained access to its internal network from where they stole roughly 200 MB of files.
While initially the company didn't reveal the content of these documents, in an updated press release, the company said the files contained primarily information on employees, and not data related to its business dealings and partners.
According to Mitsubishi, the stolen documents contained:
* Data on employment applications for 1,987 people
* The results of a 2012 employee survey that was filled in by 4,566 people from its head office
* Information on 1,569 Mitsubishi Electric workers that retired between 2007 and 2019
* Files with corporate confidential technical materials, sales materials, and others.
According to reports, the hack first originated at a Mitsubishi Electric Chinese affiliate, and then spread to 14 of the company's departments/networks. None of this was confirmed by the Japanese company, but discovered by Japanese reporters. The only technical detail in relation to the hack Mitsubishi Electric disclosed was the fact that hackers exploited a vulnerability in one of the antivirus products the company was using. The hackers exploited CVE-2019-18187, a directory traversal and arbitrary file upload vulnerability in the Trend Micro OfficeScan antivirus.
When it patched CVE-2019-18187 back in October, Trend Micro warned customers that the vulnerability was being actively exploited by hackers in the wild.
According to a security advisory Trend Micro sent out in October 2019, "affected versions of OfficeScan could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE)."
In a case study on its website, Trend Micro lists Mitsubishi Electric as one of the companies that run the OfficeScan suite.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.