Over the last 10 months, Kaspersky Lab researchers have analyzed a massive cyber-espionage operation which we call "Epic Turla". The attackers behind Epic Turla have infected several hundred computers in more than 45 countries, including government institutions, embassies, military, education, research and pharmaceutical companies.
The attacks are known to have used at least two zero-day exploits:
CVE-2013-5065 - Privilege escalation vulnerability in Windows XP and Windows 2003
CVE-2013-3346 - Arbitrary code-execution vulnerability in Adobe Reader
We also observed exploits against older (patched) vulnerabilities, social engineering techniques and watering hole strategies in these attacks. The primary backdoor used in the Epic attacks is also known as "WorldCupSec", "TadjMakhal", "Wipbot" or "Tavdig".
more here.............http://securelist.com/analysis/publications/65545/the-epic-turla-operation/
The attacks are known to have used at least two zero-day exploits:
CVE-2013-5065 - Privilege escalation vulnerability in Windows XP and Windows 2003
CVE-2013-3346 - Arbitrary code-execution vulnerability in Adobe Reader
We also observed exploits against older (patched) vulnerabilities, social engineering techniques and watering hole strategies in these attacks. The primary backdoor used in the Epic attacks is also known as "WorldCupSec", "TadjMakhal", "Wipbot" or "Tavdig".
more here.............http://securelist.com/analysis/publications/65545/the-epic-turla-operation/