• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google warns of internet explorer zero day vulnerability exploited by scarcruft

Google Warns of Internet Explorer Zero-Day Vulnerability Exploited by ScarCruft Hackers

You are here: Home / General Cyber Security News / Google Warns of Internet Explorer Zero-Day Vulnerability Exploited by ScarCruft Hackers
December 8, 2022

An Internet Explorer zero-day vulnerability was actively exploited by a North Korean risk actor to goal South Korean users by capitalizing on the recent Itaewon Halloween group crush to trick end users into downloading malware.

The discovery, noted by Google Risk Examination Group scientists Benoît Sevens and Clément Lecigne, is the most recent set of attacks perpetrated by ScarCruft, which is also referred to as APT37, InkySquid, Reaper, and Ricochet Chollima.

“The group has historically concentrated their targeting on South Korean consumers, North Korean defectors, policy makers, journalists, and human rights activists,” TAG reported in a Thursday investigation.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

The new findings illustrate the risk actor’s ongoing abuse of Internet Explorer flaws this sort of as CVE-2020-1380 and CVE-2021-26411 to drop backdoors like BLUELIGHT and Dolphin, the latter of which was disclosed by Slovak cybersecurity company ESET late past month.

A different critical device in its arsenal is RokRat, a Windows-based mostly remote entry trojan that will come with a extensive vary of features that allow for it to capture screenshots, log keystrokes, and even harvest Bluetooth machine info.

Internet Explorer Zero-Day Vulnerability

The attack chain observed by Google TAG involves the use of a destructive Microsoft Term document that was uploaded to VirusTotal on Oct 31, 2022. It abuses but a different Internet Explorer zero-working day flaw in the JScript9 JavaScript engine, CVE-2022-41128, that was patched by Microsoft last month.

The file references the Oct 29 incident that took put in the Itaewon community of Seoul and exploits community desire in the tragedy to retrieve an exploit for the vulnerability on opening it. The attack is enabled by the reality that Office renders HTML articles using Internet Explorer.

Prosperous exploitation is followed by the delivery of a shellcode that wipes all traces by clearing the Internet Explorer cache and background as nicely as downloading the future stage payload.

Google TAG explained it could not recover the stick to-on malware utilized in the marketing campaign, despite the fact that it is suspected to have concerned the deployment of RokRat, BLUELIGHT, or Dolphin.

Discovered this short article interesting? Stick to us on Twitter  and LinkedIn to study far more unique material we write-up.


Some pieces of this post are sourced from:
thehackernews.com

Previous Post: «iranian hackers strike diamond industry with data wiping malware in supply chain Iranian Hackers Strike Diamond Industry with Data-Wiping Malware in Supply-Chain Attack
Next Post: Cyber-criminals Scammed Each Other Out of Millions in 2022 Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.