Archived material. This page is preserved for historical and educational value. It reflects the threat landscape, available guidance, and research context at the time it was written or last updated. It should not be treated as a current security advisory or production remediation guidance. See the Threat Archive index for context and full listing.
Cyber Espionage · APT · 2013

NetTraveler

State-sponsored surveillance malware exploiting CVE-2010-3333 and CVE-2012-0158

Summary

NetTraveler is a spyware malware family used in advanced persistent threat (APT) campaigns for cyber espionage and surveillance. It has been active since 2004 and was publicly disclosed in 2013. The malware targets high-profile organizations to exfiltrate sensitive data.

Key Facts:

Background

NetTraveler was first observed in 2004, with the earliest samples timestamped in 2005. It was discovered and analyzed by Kaspersky Lab, who monitored the campaign and released a public report on June 4, 2013. The threat actors were notified indirectly through the public disclosure, and antivirus vendors updated signatures to detect the malware. No specific vendor patch timeline applies as it is malware, not a product vulnerability, but exploits in Microsoft Office were patched in MS10-087 (2010) and MS12-027 (2012).

Impact

What's NetTraveler

NetTraveler is a malware family designed for surveillance and data exfiltration. It is delivered via spear-phishing attachments exploiting Office vulnerabilities, installs backdoors, and communicates with command-and-control (C2) servers to steal data such as Office documents, PDFs, and specialized files like CAD drawings.

Implications

NetTraveler highlights the risks of state-sponsored cyber espionage, where persistent threats can compromise national security, intellectual property, and operational integrity. It underscores the importance of patching known vulnerabilities and monitoring for APT indicators, as unmitigated infections can lead to prolonged data leaks and strategic disadvantages.

Mitigation

Immediate (0–7 days)

Short-Term (1–4 weeks)

Medium-Term (1–3 months)

Long-Term (3–6+ months)

Timeline

DateEvent
2004Earliest known activity of NetTraveler.
2005Earliest malware samples timestamped.
2010–2013Peak period with largest number of samples observed.
June 4, 2013Public disclosure by Kaspersky Lab.
2016Continued activity, including new campaigns targeting Russia and Europe.

Key Takeaways

References

Identification Tool

Checklist for end users/techs to confirm if system is affected:

  1. Run an antivirus scan with updated definitions and check for detections of Trojan-Spy.Win32.TravNet or Downloader.Win32.NetTraveler.
  2. Check for suspicious files such as netmgr.exe, netmgr.dll, perf2012.ini in system directories.
  3. Monitor network traffic for connections to known C2 domains like andriodphone.net or IPs like 209.11.241.144.
  4. Verify if Microsoft Office patches for CVE-2010-3333 (MS10-087) and CVE-2012-0158 (MS12-027) are installed.
  5. Look for unusual processes or registry entries related to bootuid.dll or similar IOCs.
  6. If any signs are found, isolate the system and perform forensic analysis.

PowerShell Check Script

PowerShell script to check for patches related to vulnerabilities exploited by NetTraveler (CVE-2010-3333 and CVE-2012-0158).

# Example KB for CVE-2010-3333: KB2423930 (MS10-087)
# Example KB for CVE-2012-0158: KB2598041 (Office 2003, adjust for other versions)

$kb1 = 'KB2423930'  # For CVE-2010-3333
$kb2 = 'KB2598041'  # For CVE-2012-0158 (example for Office 2003)

$patch1 = Get-HotFix | Where-Object { $_.HotFixID -eq $kb1 }
$patch2 = Get-HotFix | Where-Object { $_.HotFixID -eq $kb2 }

if ($patch1) {
    Write-Host -ForegroundColor Green "OK: Patch for CVE-2010-3333 is installed."
} else {
    Write-Host -ForegroundColor Red "Update Needed: Patch for CVE-2010-3333 is missing."
}

if ($patch2) {
    Write-Host -ForegroundColor Green "OK: Patch for CVE-2012-0158 is installed."
} else {
    Write-Host -ForegroundColor Red "Update Needed: Patch for CVE-2012-0158 is missing."
}