Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Russian hackers exploited Safari and Chrome flaws in a high-profile cyber attack
Global Security

Russian hackers exploited Safari and Chrome flaws in a high-profile cyber attack

AdminBy AdminAugust 29, 2024No Comments5 Mins Read
Russian Hackers
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 29, 2024Ravi LakshmananBrowser Security / Vulnerability

Russian hackers

Cybersecurity researchers have identified several exploit campaigns in the wild that have used patched flaws in Apple’s Safari and Google Chrome browsers to infect mobile users with information-stealing malware.

“These companies presented exploits for n days for which patches were available, but they were still effective against unpatched devices,” Google Threat Analysis Group (TAG) researcher Clement Lessin said in a report shared with The Hacker News.

The activity observed between November 2023 and July 2024 is notable for the fact that the exploits were carried out using a hacker attack on the Mongolian government websites cabinet.gov(.)mn and mfa.gov(.)mn.

The set of intrusions is attributed with moderate confidence to a Russian state threat actor codenamed APT29 (aka Midnight Blizzard), with observed parallels between exploits used by the companies and those previously associated with commercial video surveillance (CSV) vendors Intellexa and NSO Group, indicating reuse of exploits.

Cyber ​​security

The vulnerabilities in Campaign Center are listed below –

  • CVE-2023-41993 – A flaw in WebKit that could lead to arbitrary code execution when handling specially crafted web content (Fixed by Apple in iOS 16.7 and Safari 16.6.1 in September 2023)
  • CVE-2024-4671 – A use-after-free bug in the Chrome visual component that could lead to arbitrary code execution (Fixed by Google in Chrome version 124.0.6367.201/.202 for Windows and macOS and version 124.0.6367.201 for Linux in May 2024)
  • CVE-2024-5274 – Type confusion in the V8 JavaScript engine and WebAssembly that could lead to arbitrary code execution (Fixed by Google in Chrome version 125.0.6422.112/.113 for Windows and macOS and version 125.0.6422.112 for Linux in May 2024)

The campaigns in November 2023 and February 2024 are said to have involved hacking two Mongolian government websites – both on the former and a single mfa.gov(.)mn on the latter – to deliver an exploit for CVE-2023-41993 using a malicious of an iframe component that points to a domain controlled by the performer.

Russian hackers

“When visited using an iPhone or iPad device, the watering hole sites used an iframe to serve a reconnaissance payload that performed validation checks before finally downloading and deploying another payload using a WebKit exploit to remove browser cookies from the device,” Google said.

Payload is a cookie hijacker structure that Google TAG has previously detailed in connection with 2021 year of operation iOS zero-day (CVE-2021-1879) to collect authentication cookies from several popular websites, including Google, Microsoft, LinkedIn, Facebook, Yahoo, GitHub, and Apple iCloud, and send them via WebSocket to a controlled IP address to attackers.

“The victim must have an open session on these websites with Safari in order for cookies to be successfully stolen,” Google said at the time, adding that “attackers used LinkedIn messaging to target government officials from Western European countries by sending them malicious links”.

The fact that the cookie hijacker module also highlights the website “webmail.mfa.gov(.)mn” suggests that Mongolian civil servants were a likely target of the iOS campaign.

The mfa.gov(.)mn website was infected a third time in July 2024 due to the injection of JavScript code that redirected Android users using Chrome to a malicious link that served an exploit chain combining CVE flaws -2024-5274 and CVE-2024-4671 to deploy a browser hijacking payload.

Russian hackers

Specifically, the attack sequence exploits CVE-2024-5274 to compromise the renderer and CVE-2024-4671 to achieve a sandbox exit vulnerability that ultimately allows Chrome to exit site isolation protection and delivery of malware theft.

“This campaign provides a simple binary removal of all Chrome crash reports and the transfer of subsequent Chrome databases back to the track-adv(.)com server — similar to the core endpoint payload seen in previous iOS campaigns,” Google TAG noted.

Cyber ​​security

The tech giant further revealed that the exploits were used in the November 2023 watering hole attack Intellexa in September 2023 share the same trigger code, a pattern also seen in the triggers for CVE-2024-5274, which was used in the July 2024 watering hole attack and the May 2024 NSO Group attack.

Moreover, the exploit for CVE-2024-4671 is said to be similar to a previous Chrome sandbox escape that Intellexa used in the wild for another Chrome flaw CVE-2021-37973which was resolved by Google in September 2021.

While it is currently unclear how attackers were able to obtain exploits for the three flaws, the results clearly show that nation-state actors are using n-day exploits, which were originally used by CSV as zero-days.

This, however, raises the possibility that the exploits could have been obtained from a vulnerability broker who previously sold them to spyware vendors as zero-days whose steady supply holds the ball how Apple and Google strengthen protection.

“Furthermore, watering hole attacks remain a threat when sophisticated exploits can be used to target those who regularly visit the sites, including on mobile devices,” the researchers said. “Vulnerabilities can still be an effective way for n-day exploits by mass targeting populations that may still be using unpatched browsers.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025

Microsoft Patches 67 vulnerability, including Zero-Day Webdav, is exploited in the wild

June 11, 2025

Researchers disclose configuration risks, including five CVE, in the Salesforce Industry Cloud

June 10, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.