Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » North Korea’s ScarCruft uses Windows Zero-Day to distribute RokRAT malware
Global Security

North Korea’s ScarCruft uses Windows Zero-Day to distribute RokRAT malware

AdminBy AdminOctober 16, 2024No Comments3 Mins Read
Windows Zero-Day
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 16, 2024Ravi LakshmananZero-Day / Windows Security

Windows Zero-Day

The North Korean threat actor known as ScarCruft was linked to exploiting a Windows zero-day patched security flaw to infect devices with malware known as RockRAT.

The vulnerability in question CVE-2024-38178 (CVSS Score: 7.5), a memory corruption bug in the scripting engine that could lead to remote code execution when using the Edge browser in Internet Explorer mode. It was patched up from Microsoft as part of the August 2024 Patch Tuesday updates.

However, for successful exploitation, an attacker must convince a user to click on a specially crafted URL to start executing malicious code.

Cyber ​​security

The AhnLab Security Intelligence Center (ASEC) and the National Cyber ​​Security Center (NCSC) of the Republic of Korea, which are credited with discovering and reporting the flaw, appointed activity cluster name Operation code on Toast.

Organizations track ScarCruft under the alias TA-RedAnt, formerly known as RedEyes. It is also known in the wider cyber security community as APT37, InkySquid, Reaper, Ricochet Chollima and Ruby Sleet.

The zero-day attack “is characterized by the use of a special ‘toast’ adware that is commonly bundled with various free software,” ASEC said in a statement shared by The Hacker News. “Toast ads in Korea mean pop-up notifications that appear at the bottom of the PC screen, usually in the lower right corner.”

A chain of attacks documented by a South Korean cybersecurity firm shows that threat actors compromised the server of an unnamed domestic advertising agency that supplies content for promotional toasts in order to inject exploit code into the advertising content script.

RokRAT malware

The vulnerability is said to be triggered when the toast program downloads and displays mined content from a server.

“The attacker targeted a specific toast program that uses an unsupported module (Internet Explorer) to download advertising content,” according to a joint ASEC and NCSC threat analysis.

“This vulnerability causes IE’s JavaScript Engine (jscript9.dll) to incorrectly interpret data types, resulting in a type confusion error. An attacker used this vulnerability to infect a PC with a vulnerable toast program. Once infected, PCs were exposed to various malicious activities, including remote access.”

The latest version of RokRAT is capable of listing files, terminating arbitrary processes, receiving and executing commands received from a remote server, and collecting data from various applications such as KakaoTalk, WeChat, and browsers such as Chrome, Edge, Opera, Naver Wales, and Firefox.

Cyber ​​security

RokRAT is also notable for using legitimate cloud services such as Dropbox, Google Cloud, pCloud, and Yandex Cloud as its management and control server, allowing it to blend in with normal traffic in corporate environments.

This isn’t the first time ScarCruft has used vulnerabilities in an outdated browser to create the following malware. In recent years, it has been put into operation CVE-2020-1380another lack of memory in the Scripting Engine, and CVE-2022-41128remote code execution vulnerability in Windows scripting languages.

“The technological level of North Korean hacking organizations has become more advanced, and they are exploiting various vulnerabilities in addition to (Internet Explorer),” the report said. “Accordingly, users should update their operating system and software security.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.