Trusted Design

New Internet Explorer zero-day exploited in Hong Kong attacks

概要

A newly patched zero-day vulnerability in Internet Explorer has already been exploited in attacks involving a compromised website belonging to an evangelical church in Hong Kong. Symantec telemetry revealed an exploit hosted on the compromised site, which was used to infect visitors with the Korplug back door (detected by Symantec as Backdoor.Korplug). The attackers compromised the website of the Evangelical Lutheran Church of Hong Kong and modified it to host a malicious iFrame which redirected visitors to another website hosting an exploit of the Internet Explorer Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2015-2502). The IP address of this website is 115.144.107.55.

Created: 2026-02-23

Indicators

類似Pulses

このPulseに関連する脅威アクター (事実ベース)

Sandworm Team

Score: 14.50
Matched TTPs:
  • T1588.006 - Vulnerabilities
  • T1598.003 - Spearphishing Link
  • T1190 - Exploit Public-Facing Application
  • T1102.002 - Bidirectional Communication
  • T1203 - Exploitation for Client Execution
  • T1584.004 - Server
MITREへのリンク →

Volt Typhoon

Score: 9.80
Matched TTPs:
  • T1588.006 - Vulnerabilities
  • T1190 - Exploit Public-Facing Application
  • T1584.004 - Server
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Storm-0501

Score: 5.31
Matched TTPs:
  • T1588.006 - Vulnerabilities
  • T1190 - Exploit Public-Facing Application
MITREへのリンク →

Sidewinder

Score: 3.95
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

Scattered Spider

Score: 4.11
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Mustang Panda

Score: 8.08
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1203 - Exploitation for Client Execution
  • T1027.007 - Dynamic API Resolution
MITREへのリンク →

ZIRCONIUM

Score: 4.86
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1102.002 - Bidirectional Communication
MITREへのリンク →

APT32

Score: 5.72
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1203 - Exploitation for Client Execution
  • T1189 - Drive-by Compromise
MITREへのリンク →

Kimsuky

Score: 12.11
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1190 - Exploit Public-Facing Application
  • T1102.002 - Bidirectional Communication
  • T1021.001 - Remote Desktop Protocol
  • T1588.005 - Exploits
MITREへのリンク →

Magic Hound

Score: 13.36
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1190 - Exploit Public-Facing Application
  • T1567 - Exfiltration Over Web Service
  • T1102.002 - Bidirectional Communication
  • T1189 - Drive-by Compromise
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

APT28

Score: 17.74
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1190 - Exploit Public-Facing Application
  • T1567 - Exfiltration Over Web Service
  • T1102.002 - Bidirectional Communication
  • T1203 - Exploitation for Client Execution
  • T1189 - Drive-by Compromise
  • T1498 - Network Denial of Service
MITREへのリンク →

CURIUM

Score: 4.22
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1189 - Drive-by Compromise
MITREへのリンク →

Dragonfly

Score: 11.67
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1190 - Exploit Public-Facing Application
  • T1203 - Exploitation for Client Execution
  • T1189 - Drive-by Compromise
  • T1584.004 - Server
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Patchwork

Score: 10.52
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1027.005 - Indicator Removal from Tools
  • T1203 - Exploitation for Client Execution
  • T1189 - Drive-by Compromise
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Threat Group-3390

Score: 4.73
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1203 - Exploitation for Client Execution
  • T1189 - Drive-by Compromise
MITREへのリンク →

FIN7

Score: 5.52
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1102.002 - Bidirectional Communication
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Ember Bear

Score: 7.10
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1203 - Exploitation for Client Execution
  • T1588.005 - Exploits
MITREへのリンク →

FIN13

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Medusa Group

Score: 7.66
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
  • T1218.014 - MMC
MITREへのリンク →

Fox Kitten

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

BlackByte

Score: 6.74
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1567 - Exfiltration Over Web Service
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Agrius

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

menuPass

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Blue Mockingbird

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

GALLIUM

Score: 4.62
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1027.005 - Indicator Removal from Tools
MITREへのリンク →

Winter Vivern

Score: 3.24
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1189 - Drive-by Compromise
MITREへのリンク →

Earth Lusca

Score: 6.07
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1189 - Drive-by Compromise
  • T1584.004 - Server
MITREへのリンク →

APT29

Score: 7.50
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1203 - Exploitation for Client Execution
  • T1090.004 - Domain Fronting
MITREへのリンク →

Leviathan

Score: 9.21
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1203 - Exploitation for Client Execution
  • T1189 - Drive-by Compromise
  • T1584.004 - Server
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

INC Ransom

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

UNC3886

Score: 6.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1027.005 - Indicator Removal from Tools
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

Axiom

Score: 10.91
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1203 - Exploitation for Client Execution
  • T1189 - Drive-by Compromise
  • T1021.001 - Remote Desktop Protocol
  • T1001.002 - Steganography
MITREへのリンク →

APT41

Score: 4.61
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1203 - Exploitation for Client Execution
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

APT5

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

MuddyWater

Score: 9.49
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1218.003 - CMSTP
  • T1102.002 - Bidirectional Communication
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

APT39

Score: 5.52
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1102.002 - Bidirectional Communication
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Contagious Interview

Score: 3.62
Matched TTPs:
  • T1567 - Exfiltration Over Web Service
MITREへのリンク →

Cobalt Group

Score: 7.27
Matched TTPs:
  • T1218.003 - CMSTP
  • T1203 - Exploitation for Client Execution
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Deep Panda

Score: 3.15
Matched TTPs:
  • T1027.005 - Indicator Removal from Tools
MITREへのリンク →

OilRig

Score: 6.29
Matched TTPs:
  • T1027.005 - Indicator Removal from Tools
  • T1203 - Exploitation for Client Execution
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Turla

Score: 10.15
Matched TTPs:
  • T1027.005 - Indicator Removal from Tools
  • T1102.002 - Bidirectional Communication
  • T1189 - Drive-by Compromise
  • T1584.004 - Server
MITREへのリンク →

APT3

Score: 6.29
Matched TTPs:
  • T1027.005 - Indicator Removal from Tools
  • T1203 - Exploitation for Client Execution
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

APT37

Score: 5.66
Matched TTPs:
  • T1102.002 - Bidirectional Communication
  • T1203 - Exploitation for Client Execution
  • T1189 - Drive-by Compromise
MITREへのリンク →

Lazarus Group

Score: 14.27
Matched TTPs:
  • T1102.002 - Bidirectional Communication
  • T1203 - Exploitation for Client Execution
  • T1189 - Drive-by Compromise
  • T1584.004 - Server
  • T1027.007 - Dynamic API Resolution
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

APT12

Score: 3.89
Matched TTPs:
  • T1102.002 - Bidirectional Communication
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

HEXANE

Score: 4.05
Matched TTPs:
  • T1102.002 - Bidirectional Communication
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Andariel

Score: 3.26
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1189 - Drive-by Compromise
MITREへのリンク →

BRONZE BUTLER

Score: 3.26
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1189 - Drive-by Compromise
MITREへのリンク →

Transparent Tribe

Score: 3.26
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1189 - Drive-by Compromise
MITREへのリンク →

Elderwood

Score: 3.26
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1189 - Drive-by Compromise
MITREへのリンク →

Darkhotel

Score: 3.26
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1189 - Drive-by Compromise
MITREへのリンク →

Daggerfly

Score: 4.60
Matched TTPs:
  • T1189 - Drive-by Compromise
  • T1584.004 - Server
MITREへのリンク →

Indrik Spider

Score: 4.48
Matched TTPs:
  • T1584.004 - Server
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

このPulseに関連する脅威アクター (推論ベース)

APT28

Score: 0.79
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1203 - Exploitation for Client Execution
  • T1102.002 - Bidirectional Communication
  • T1190 - Exploit Public-Facing Application
  • T1189 - Drive-by Compromise
  • T1567 - Exfiltration Over Web Service
  • T1498 - Network Denial of Service
MITREへのリンク →

Sandworm Team

Score: 0.67
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1203 - Exploitation for Client Execution
  • T1102.002 - Bidirectional Communication
  • T1190 - Exploit Public-Facing Application
  • T1584.004 - Server
  • T1588.006 - Vulnerabilities
MITREへのリンク →

Lazarus Group

Score: 0.65
Matched TTPs:
  • T1203 - Exploitation for Client Execution
  • T1102.002 - Bidirectional Communication
  • T1189 - Drive-by Compromise
  • T1027.007 - Dynamic API Resolution
  • T1584.004 - Server
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Magic Hound

Score: 0.61
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1102.002 - Bidirectional Communication
  • T1189 - Drive-by Compromise
  • T1190 - Exploit Public-Facing Application
  • T1567 - Exfiltration Over Web Service
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Dragonfly

Score: 0.55
Matched TTPs:
  • T1598.003 - Spearphishing Link
  • T1203 - Exploitation for Client Execution
  • T1189 - Drive-by Compromise
  • T1190 - Exploit Public-Facing Application
  • T1584.004 - Server
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Related CVEs

Pulse – 脅威アクター グラフ


← Pulse一覧に戻る