HomeCyber BalkansKimusky Exploits RDP and MS Office Vulnerabilities in Targeted Intrusions

Kimusky Exploits RDP and MS Office Vulnerabilities in Targeted Intrusions

Published on

spot_img

The recent analysis by the AhnLab Security Intelligence Center (ASEC) sheds light on a sophisticated cyber campaign labeled “Larva-24005,” attributed to the notorious North Korean hacking group Kimsuky. This operation has been actively targeting critical sectors in South Korea, specifically focusing on software, energy, and financial industries, since October 2023.

What sets this campaign apart is its global reach, as it has expanded to include systems in the United States, China, Japan, Germany, Singapore, and other nations. The operation utilizes advanced tools and techniques to infiltrate these systems, exploiting vulnerabilities such as the well-known RDP vulnerability BlueKeep (CVE-2019-0708).

The initial access to compromised systems was achieved through the exploitation of the BlueKeep RDP vulnerability, although there was no confirmed utilization of RDP vulnerability scanners in the actual breaches. Instead, the attackers leveraged phishing emails and other exploit vectors to deliver their payload. For instance, phishing emails sent to targets in South Korea and Japan contained malicious attachments that exploited the Microsoft Office Equation Editor vulnerability (CVE-2017-11882), enabling malware distribution.

Once inside the network, the threat actors utilized droppers to install various malware suites, including RDPWrap for remote access, MySpy for system information collection, and Keyloggers like KimaLogger and RandomQuery to capture user inputs. These tools, along with utilities like RDPScanner, demonstrate Kimsuky’s strategic approach to ensure continuous access and data exfiltration.

Furthermore, an infrastructure analysis revealed that the attackers predominantly used kr domains for their Command and Control (C2) operations, showcasing a sophisticated setup to manage traffic rerouting and potentially evade detection.

This campaign highlights the persistent threat posed by state-sponsored actors like Kimsuky, who continuously refine their tactics and exploit known vulnerabilities to gain unauthorized access. This underscores the importance of timely patching and robust cybersecurity practices to thwart such advanced persistent threats.

In terms of Indicators of Compromise (IOCs) associated with the campaign, some notable ones include specific MD5 hashes and URLs/FQDNs, such as http[:]//star7[.]kro[.]kr/login/help/show[.]php?_Dom=991 and http[:]//www[.]sign[.]in[.]mogovernts[.]kro[.]kr/rebin/include[.]php?_sys=7.

As the cybersecurity landscape continues to evolve, staying informed about such threats and implementing best practices becomes crucial. Follow us on Google News, LinkedIn, and X for instant updates on cybersecurity news.

Source link

Latest articles

Nation-State Threats Target Small and Medium Businesses

Small and medium-sized businesses (SMBs) are facing a growing threat from cyberthreat groups who...

IBM X-Force warns of increasing stealthy attacks and emergence of toolkits targeting AI

In a recent report by X-Force, it was predicted that the increasing dominance of...

Cracked Cybercrime Marketplace Appears to Be Back

The notorious online cybercrime marketplace known as Cracked has reportedly made a comeback, along...

The Vulnerability in ASUS AiCloud Routers Exposes Devices

ASUS has recently confirmed a critical security vulnerability in its AiCloud routers, which could...

More like this

Nation-State Threats Target Small and Medium Businesses

Small and medium-sized businesses (SMBs) are facing a growing threat from cyberthreat groups who...

IBM X-Force warns of increasing stealthy attacks and emergence of toolkits targeting AI

In a recent report by X-Force, it was predicted that the increasing dominance of...

Cracked Cybercrime Marketplace Appears to Be Back

The notorious online cybercrime marketplace known as Cracked has reportedly made a comeback, along...