HomeCII/OTNorth Korean Hackers Target Chromium Using FudModule Rootkit

North Korean Hackers Target Chromium Using FudModule Rootkit

Published on

spot_img

A recent cyber attack orchestrated by a North Korean threat actor has raised concerns within the cybersecurity community. The attack exploited a zero-day vulnerability in Google’s Chromium browser to deploy the FudModule rootkit, with a primary focus on targeting cryptocurrency firms for financial gain.

Microsoft, a prominent player in the cybersecurity space, uncovered this sophisticated cyber operation attributed to a group known as Citrine Sleet. This threat actor leveraged a zero-day vulnerability, tracked as CVE-2024-7971, to execute their malicious activities. The attack, specifically aimed at the cryptocurrency sector, highlighted the evolving tactics of state-sponsored hacking groups.

Citrine Sleet, with a history of targeting financial institutions, utilized a type confusion vulnerability in the V8 JavaScript and WebAssembly engine to breach versions of Chromium before 128.0.6613.84. The attackers initiated the operation by luring victims to a malicious domain, voyagorclub[.]space, where they deployed a zero-day RCE exploit to gain access to the sandboxed Chromium renderer process.

Once inside the target systems, Citrine Sleet deployed the FudModule rootkit, a malicious tool designed to disrupt kernel security mechanisms through Direct Kernel Object Manipulation (DKOM). This rootkit enabled persistent backdoor access to compromised systems, facilitating the theft of sensitive data and the deployment of additional malware. Notably, the FudModule rootkit has been linked to another North Korean threat group, Diamond Sleet, hinting at potential collaboration between these state-sponsored actors.

The attack further exploited a vulnerability, CVE-2024-38106, in the Windows kernel to escape the browser’s sandbox and gain deeper control over the system. Despite Microsoft patching this kernel vulnerability shortly before the attack’s discovery, the threat actors managed to exploit it effectively, underscoring their preparedness and technical capabilities.

The FudModule rootkit, primarily associated with the Lazarus Group, represents a sophisticated malware tool with advanced features aimed at enhancing stealth and functionality. Its evolution includes exploiting a zero-day vulnerability in the AppLocker driver to achieve kernel-level access, utilizing advanced techniques like handle table entry manipulation and DKOM, and focusing on stealth enhancements to evade detection by security solutions.

Recommendations from Microsoft emphasize the importance of immediate system updates, particularly for Chromium-based browsers, to mitigate risks associated with the exploited vulnerabilities. Organizations are urged to deploy robust security solutions, educate employees on phishing and social engineering risks, implement network segmentation, and monitor network traffic to bolster their defenses against similar attacks.

In an era where cyber threats continue to evolve, the collaboration between threat actors and the sophistication of their tactics highlight the critical need for proactive cybersecurity measures. By implementing the recommended mitigations and staying vigilant against emerging threats, organizations can significantly reduce their susceptibility to malicious activities orchestrated by state-sponsored hacking groups like Citrine Sleet.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...