HomeCII/OTNorth Korea Uses Microsoft Vulnerability in No-Click Malware Attacks

North Korea Uses Microsoft Vulnerability in No-Click Malware Attacks

Published on

spot_img

Security researchers have uncovered a sophisticated cyberattack carried out by the North Korea-based advanced persistent threat group known as APT37. This group exploited a zero-day vulnerability in Microsoft’s outdated Internet Explorer web browser to launch a zero-click supply chain campaign targeting South Korean entities during the summer.

Despite the fact that Internet Explorer reached its end of life in 2022 and is no longer in widespread use, many legacy applications still rely on it. In this particular case, APT37, also known as RedAnt, RedEyes, ScarCruft, and Group123, set its sights on a Toast ad program commonly bundled with free software. These Toast ad programs utilize a feature called WebView to display ads, which if based on IE, can be exploited through IE vulnerabilities.

A report from AhnLab Security Intelligence Center (ASEC) highlighted how APT37 infiltrated an ad agency and leveraged a specific bug, identified as CVE-2024-38178, to inject malicious code into the Toast script used by the agency to distribute ad content. This malicious code transformed the script into a delivery mechanism for malware, ultimately infecting targeted systems with a strain of malware known as RokRAT, a tool frequently employed by APT37 in the past.

The attack, dubbed “Code on Toast” by researchers, was characterized by its zero-click nature, requiring no user interaction for the malware to execute. Once a system was compromised, the attackers could perform various malicious activities, including remote commands and maintaining persistence through Ruby and command control via a commercial cloud server.

Fortunately, the attack was detected early, preventing significant damage. AhnLab reported that security measures were implemented to safeguard against potential exploitation by other Toast advertising programs before a patch for the vulnerability was available.

Although Microsoft released a patch for the exploited bug in its August Patch Tuesday update, the incident underscores the ongoing threat posed by the continued presence of IE within applications and software. Hackers are incentivized to uncover and exploit IE zero-day vulnerabilities as long as the browser remains integrated into various products.

AhnLab researchers warned that such attacks are challenging to defend against and can have far-reaching consequences depending on the software being targeted. They also noted an increasing trend in North Korean hacking groups leveraging various vulnerabilities beyond IE, highlighting the need for users to maintain up-to-date software and for developers to avoid using vulnerable development libraries and modules.

As cyber threats evolve and grow in sophistication, vigilance and proactive security measures are essential to safeguard against potential attacks. Users must remain diligent in updating their systems, while software manufacturers must prioritize security in product development to mitigate risks associated with vulnerable components.

In conclusion, the Code on Toast cyberattack serves as a stark reminder of the persistent threats posed by sophisticated threat actors and underscores the critical importance of cybersecurity readiness in today’s digital landscape.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...