Join Trustwave at the 2023 Gartner Security & Risk Management Summit in London, September 26-28. Learn More

Join Trustwave at the 2023 Gartner Security & Risk Management Summit in London, September 26-28. Learn More

Managed Detection & Response

Eradicate cyberthreats with world-class intel and expertise

Managed Security Services

Expand your team’s capabilities and strengthen your security posture

Consulting & Professional Services

Tap into our global team of tenured cybersecurity specialists

Penetration Testing

Subscription- or project-based testing, delivered by global experts

Database Security

Get ahead of database risk, protect data and exceed compliance requirements

Email Security & Management

Catch email threats others miss with layered security & maximum control

Co-Managed SOC (SIEM)

Eliminate alert fatigue, focus your SecOps team, stop threats fast, and reduce cyber risk

Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
The Trustwave Approach
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Platform
SpiderLabs Fusion Center
Security Operations Centers
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

CVE-2014-0515 Goes to Brazil for World Cup 2014

The FIFA World Cup 2014 begings June 12 and enthusiasm about the event has shown itself in increased traffic to different sport websites around the world. With more people visiting certain websites, you can bet that malicious individuals will look to take advantage. Traffic can easily translate to money, and we've discovered a malicious advertising banner hoping to cash-in on increased traffic to a sports website that's popular in Brazil.

Just about a month ago Kaspersky reported an exploit that was abusing a zero-day in Adobe Flash Player (CVE-2014-0515). We recently observed the use of this zero-day in attempts to deliver malware to our customers. After some further analysis, we came across the malicious advertisement (malvertising) on the website.

Screen Shot 2014-06-03

This site's ad provider is redirecting users to "" a domain associated with previous malvertising campaigns. The site owners were notified and are taking measures to resolve the issue.

The samples we observed were placed on a public service for SWF hosting ( The campaign is obviously a work in progress because we see newer samples protecting against decompilation of the ActionScript code by "SWF Defender" (a commercial obfuscator for SWF files). The earliest sample we observed was uploaded on May 14 and the latest on May 22.

We also noted that the attackers didn't just copy-paste the original code. Attackers behind this campaign employ the already known and widely used technique of corrupting AS vector size value in order to read the full address space. Unlike the original sample of CVE-2014-0515 where the attackers corrupt a Sound object vftable, however, they choose the FileReference object in this case.

Screen Shot 2014-06-03 at 3.33.46 PM

Discussed malicious URLs can be found here:

All customers of Trustwave SWG are protected against this threat without any additional updates.

Special thanks to my colleague Ben Hayak for helping with this blog.