Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » South Korean ERP vendor’s server hacked to spread Xctdoor malware
Global Security

South Korean ERP vendor’s server hacked to spread Xctdoor malware

AdminBy AdminJuly 6, 2024No Comments2 Mins Read
Xctdoor Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 3, 2024Information hallMalware / Threat Intelligence

Xctdoor malware

The product update server of an unnamed South Korean enterprise resource planning (ERP) vendor was found to have been compromised to provide a Go-based backdoor dubbed Xctdoor.

AhnLab Security Intelligence Center (ASEC), which identified did not attribute the May 2024 attack to a known threat or group, but noted that tactics overlapped with Andariela subcluster of the infamous Lazarus group.

The similarity stems from the previous use by a North Korean adversary of an ERP solution to distribute malware such as HotCroissant, identical Rifdor – in 2017 by inserting a malicious procedure into the software update program.

Cyber ​​security

In a recent incident analyzed by ASEC, the same executable was forged to execute a DLL file at a specific path using regsvr32.exe process as opposed to starting the bootloader.

The DLL file, Xctdoor, is capable of stealing system information, including keystrokes, screenshots, and clipboard contents, as well as executing commands issued by the threat.

“Xctdoor communicates with the (command and control) server using the HTTP protocol, while packet encryption uses the Mersenne Twister (MT19937) and Base64 algorithms,” ASEC said.

The attack also uses a malware called XcLoader, which serves as a malware injector responsible for injecting Xctdoor into legitimate processes (such as “explorer.exe”).

ASEC said it has additionally discovered instances of poorly secured web servers being compromised to install XcLoader since at least March 2024.

This event became another threat associated with North Korea Kimuski the use of a previously undocumented codenamed backdoor was observed HappyDoor which was commissioned back in July 2021.

Cyber ​​security

Attack chains that distribute malware use phishing emails as a starting point to distribute a compressed file containing obfuscated JavaScript or a dropper that, when executed, creates and runs HappyDoor along with the decoy file.

HappyDoor, a DLL file executed via regsvr32.exe, is equipped to communicate with a remote server via HTTP and facilitate information theft, upload/download files, and update and terminate itself.

It also stems from a “massive” malware campaign organized Horses cyber espionage group (aka Opal Sleet, Osmium, or TA406) targeted South Korea with phishing lures impersonating the national tax service to deliver malware capable of stealing sensitive information, security researcher Idan Tarab said.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025

Researchers in detail in detail decisively developing tactics as it expands its geographical volume

June 5, 2025

Iran related

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.