This examined series of attacks was no exception.Phishing emails,used as the initial attack vector,were tailored and customized under the specific language for each specific victim.The malware used in this attack performed destructive activity only if the operating system had a localization that matched the language used in the phishing email.For example,in the case of an attack on a company from Japan,the text of a phishing email and a Microsoft Office document containing a malicious macro were written in Japanese.Also,to successfully decrypt the malware module,the operating system must have had a Japanese localization.
经过审查的一系列攻击也不例外。用作初始攻击媒介的网络钓鱼电子邮件是根据每个特定受害者的特定语言量身定制的。只有当操作系统的本地化与网络钓鱼电子邮件中使用的语言相匹配时,此攻击中使用的恶意软件才会执行破坏性活动。例如,在一家日本公司遭到攻击的情况下,网络钓鱼电子邮件的文本和包含恶意宏的Microsoft Office文档都是用日语编写的。此外,要成功解密恶意软件模块,操作系统必须具有日语本地化。
Baumer Electric: IFR 12.26.35/S13/L Proximity Sensor
IFM Electronics Model: OK5001/OKF-FPKG Fiber Amplifier
AT&T / Lucent PN: 107044869, GS/LS/TTR Module M
Jonard / Haldex Tension Guague, 0 – 150 Grams
Digital Equipment (DEC) M3127-PA, DESQA-SA Board
ADVANSYS ABP-915H PCI SCSI CONTROLLER 5029-0024-03
Allen-Bradley Cat. No. 2760-SFC2 Protocol Cartridge
Huntington Model: EV-150 Valve