• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
windows devices targeted by puzzlemaker malware exploiting chrome zero day flaw

Windows devices targeted by PuzzleMaker malware exploiting Chrome zero-day flaw

You are here: Home / General Cyber Security News / Windows devices targeted by PuzzleMaker malware exploiting Chrome zero-day flaw
June 9, 2021

Shutterstock

Security scientists have warned about PuzzleMaker, a new hacking team that is making use of a series of Google Chrome and Windows 10 exploits to attack businesses throughout the world.

In accordance to stories, researchers 1st observed the attacks in mid-April. These attacks, which have been remarkably qualified towards corporations all over the world, applied a chain of Google Chrome and Microsoft Windows zero-day exploits. 

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Scientists failed to uncover an exploit utilized for distant code execution (RCE) in Chrome but discovered and analyzed an elevation-of-privilege exploit made use of to escape the sandbox and receive procedure privileges.

As researchers did not discover the RCE in Chrome, they appeared in other places and identified a feasible prospect. On April 12, Chromium builders committed two (issue 1196683, issue 1195777) Typer-relevant bug fixes to the open up resource repository of V8 — a JavaScript engine utilized by Chrome and Chromium web browsers. This was after a crew in a Pwn2Possess levels of competition shown productive exploitation of the Chrome renderer procedure utilizing a Typer Mismatch bug.

“A person of these bug fixes (issue 1196683) was intended to patch a vulnerability that was made use of for the duration of Pwn2Possess, and the two bug fixes were dedicated collectively with regression assessments – JavaScript documents to set off these vulnerabilities,” stated researchers.

Scientists mentioned a consumer with the Twitter handle @r4j0x00 later posted a performing distant code execution exploit on GitHub.

Pursuing the use of this exploit, hackers then made use of a further exploit to abuse Windows Notification Facility (WNF) with a Windows NTFS privilege escalation bug (CVE-2021-31956) to execute code with program privileges on compromised Windows 10 programs.

This enabled hackers to entry the victim’s method and execute 4 malware modules these had been stager, dropper, company, and distant shell modules.

The stager checks if exploitation is successful. If so, it downloads a dropper module from a C2 server.  The dropper module installs two executables that fake to be reputable Windows information. The 1st file is registered as a service and applied as a launcher for the next executable. The next file is used as a remote shell and is the attack’s key payload.

“The remote shell module has a hardcoded URL of the C&C server inside (media-seoengine[.]com). All the communication concerning the C&C server and customer is approved and encrypted. The remote shell module is in a position to download and add documents, produce processes, snooze for specified quantities of time and delete itself from the compromised equipment,” explained scientists.

Scientists warned the malware would not show up to have any strong connections to other risk actors. Companies have been urged to utilize all patches to affected programs as before long as attainable.


Some areas of this report are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News CISA and Bugcrowd to Launch Federal Crowdsourced VDP Platform
Next Post: DarkSide Pwned Colonial With Old VPN Password darkside pwned colonial with old vpn password»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.