HomeCII/OTNorth Korean APT Exploits Novel Chromium and Windows Bugs to Steal Crypto

North Korean APT Exploits Novel Chromium and Windows Bugs to Steal Crypto

Published on

spot_img

A recent cyber threat emerged from North Korean intelligence operatives, who utilized two novel vulnerabilities in an attempt to infiltrate the cryptocurrency industry. While most financial cybercrimes are typically attributed to lower-level criminals seeking quick financial gain, North Korea has distinguished itself through highly sophisticated operations aimed at generating substantial revenue to support its nuclear programs, as per US authorities.

The latest endeavor by North Korean threat actors showcases a level of sophistication not seen before, as they exploited previously undiscovered vulnerabilities in Windows and Chromium browsers. By combining these vulnerabilities and leveraging a rootkit, the attackers were able to gain deep access to targeted systems before executing their theft.

The first phase of this attack involved the exploitation of an actively utilized zero-day vulnerability in the Chromium browser. Google’s recent update to Chrome included fixes for numerous security issues, with the highlight being CVE-2024-7971, a critical type confusion flaw in the V8 engine enabling remote code execution. This zero-day vulnerability, actively exploited by North Korean threat actors tracked as Citrine Sleet, targeted cryptocurrency companies for financial gain, according to Microsoft.

Moving to the second phase, the attackers exploited a Windows Kernel bug (CVE-2024-38106) in conjunction with the Chromium zero-day vulnerability to escalate their attack. By chaining the two high-severity vulnerabilities, Citrine Sleet was able to gain system-level privileges on compromised machines, further enhancing their access and capabilities.

As the attackers progressed through their operation, they deployed a rootkit known as FudModule to evade detection mechanisms and ensure persistent access to compromised systems. This rootkit, shared with another threat actor group, Diamond Sleet, employs advanced techniques to bypass kernel security checks, making it challenging for security tools to detect and mitigate the threat.

Upon successfully infiltrating the targeted systems, Citrine Sleet typically deploys the AppleJeus Trojan, designed to extract sensitive information related to cryptocurrencies and other assets from victims. This comprehensive approach underscores the level of sophistication and planning involved in the cybercrime campaign orchestrated by North Korean threat actors.

Despite the significant resources invested in these exploits, questions remain about the sustainability of such operations for the attackers. With the high cost associated with remote code execution exploits in the black market, there is speculation about the long-term viability of these endeavors for threat actors like Lazarus. The financial implications and strategic motives behind these cyber operations raise concerns about the broader implications for cybersecurity and international relations.

In conclusion, the recent cyber threat orchestrated by North Korean intelligence operatives highlights the evolving landscape of cyber warfare and the critical importance of robust cybersecurity measures to combat such sophisticated attacks. As threat actors continue to adapt and refine their tactics, it is imperative for organizations and governments to remain vigilant and proactive in defending against potential cyber threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...