CFR watering hole attack also target Capstone Turbine Corporation
Tuesday, January 1, 2013
Capstone Turbine Corporation,
Council on Foreign Relations,
drive-by attack,
Eric Romang,
Hacking News,
Internet Explorer,
Threat Intelligence,
urlQuery,
VirusTotal,
Zeus
Edit

According to researcher Eric Romang, CFR watering hole attack (CVE-2012-4969 and CVE-2012-4792) has also target Capstone Turbine Corporation website since mid-September. He was able to find a cached version of the first JavaScript that starts the drive-by attack. Then on further search finds that by doing a Google dork search site:capstoneturbine.com "_include" we can see something strangely like CFR.org "news_14242aa.html" file.
Capstone Turbine Corporation is the world's leading producer of low-emission microturbine systems, and was first to market with commercially viable microturbine energy products. Capstone Turbine has shipped thousands of Capstone MicroTurbine systems to customers worldwide.
Jindrich Kubec director of Threat Intelligence at avast confirm the presence of exploit in September on Capstone Turbine Corporation, "I wrote to Capstone Turbine on 19th Sep about the Flash exploit stuff they were hosting. They never replied. And also not fixed"
Eric shows many valid proofs from urlQuery and VirusTotal results that can confirm the presence of hacks on this new target and he suggest, "Potentially the guys behind CVE-2012-4969 and CVE-2012-4792 are the same."
Fortunately, Microsoft have come up a patch and therefore the new year will be having a safe start after all.
Have something to say about this article? Comment below or share it with us on Facebook, Twitter or our LinkedIn Group.
0 Response to "CFR watering hole attack also target Capstone Turbine Corporation"
Post a Comment