• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
south korean erp vendor's server hacked to spread xctdoor malware

South Korean ERP Vendor’s Server Hacked to Spread Xctdoor Malware

You are here: Home / General Cyber Security News / South Korean ERP Vendor’s Server Hacked to Spread Xctdoor Malware
July 3, 2024

An unnamed South Korean company source setting up (ERP) vendor’s product or service update server has been found to be compromised to deliver a Go-dependent backdoor dubbed Xctdoor.

The AhnLab Security Intelligence Centre (ASEC), which recognized the attack in Could 2024, did not attribute it to a known risk actor or team, but noted that the practices overlap with that of Andariel, a sub-cluster within just the infamous Lazarus Group.

The similarities stem from the North Korean adversary’s prior use of ERP solution to distribute malware like HotCroissant – which is similar to Rifdoor – in 2017 by inserting a malicious routine into a program update software.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

In the the latest incident analyzed by ASEC, the same executable is reported to have been tampered with to execute a DLL file from a precise route working with the regsvr32.exe process as opposed to launching a downloader.

The DLL file, Xctdoor, is able of thieving program facts, like keystrokes, screenshots, and clipboard written content, and executing instructions issued by the danger actor.

“Xctdoor communicates with the [command-and-control] server using the HTTP protocol, when the packet encryption employs the Mersenne Twister (MT19937) algorithm and the Base64 algorithm,” ASEC said.

Also employed in the attack is a malware named XcLoader, which serves as an injector malware liable for injecting Xctdoor into respectable procedures (e.g., “explorer.exe”).

ASEC claimed it even more detected circumstances where by poorly secured web servers have been compromised to put in XcLoader given that at minimum March 2024.

The improvement will come as the a further North Korea-joined risk actor referred to as Kimusky has been observed applying a earlier undocumented backdoor codenamed HappyDoor that has been set to use as considerably again as July 2021.

Cybersecurity

Attack chains distributing the malware leverage spear-phishing emails as a starting issue to disseminate a compressed file, which has an obfuscated JavaScript or dropper that, when executed, creates and operates HappyDoor alongside a decoy file.

HappyDoor, a DLL file executed by means of regsvr32.exe, is geared up to talk with a remote server in excess of HTTP and aid details theft, down load/upload files, as perfectly as update and terminate alone.

It also follows a “substantial” malware distribution campaign orchestrated by the Konni cyber espionage team (aka Opal Sleet, Osmium, or TA406) concentrating on South Korea with phishing lures impersonating the countrywide tax service to supply malware capable of thieving sensitive facts, security researcher Idan Tarab explained.

Observed this article fascinating? Observe us on Twitter  and LinkedIn to study extra unique content material we publish.


Some sections of this short article are sourced from:
thehackernews.com

Previous Post: «how mfa failures are fueling a 500% surge in ransomware How MFA Failures are Fueling a 500% Surge in Ransomware Losses
Next Post: Israeli Entities Targeted by Cyberattack Using Donut and Sliver Frameworks israeli entities targeted by cyberattack using donut and sliver frameworks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.