๎ ‚December 8, 2022๎ „Rabbi LakshmananPatch management / zero-day

A zero-day vulnerability in Internet Explorer was actively exploited by North Korean threat actors, using recent vulnerabilities to target South Korean users. Itaewon Halloween Crowd Crush Trick users into downloading malware.

The discovery, reported by Google Threat Analysis Group researchers Benoรฎt Sevens and Clรฉment Lecigne, scar craftAPT37, InkySquid, Reaper, and Ricochet Chollima.

โ€œThe group has historically targeted South Korean users, North Korean defectors, policy makers, journalists and human rights activists,โ€ TAG said. Said Analysis on Thursday.

cyber security

New research indicates that threat actors continue to exploit Internet Explorer flaws such as CVE-2020-1380 and CVE-2021-26411 to create backdoors such as BLUELIGHT and Dolphin. The latter was made public late last month by Slovak cybersecurity firm ESET.

Another important tool in its arsenal is RokRat, a Windows-based remote access Trojan with extensive functionality that allows it to capture screenshots, log keystrokes, and even collect Bluetooth device information. I have it.

Internet Explorer zero-day vulnerability

The attack chain observed by Google TAG involves the use of malicious Microsoft Word documents. Upload to VirusTotal October 31, 2022. It exploits a zero-day vulnerability in Internet Explorer, CVE-2022-41128, in the JScript9 JavaScript engine that Microsoft patched last month.

The file references the October 29th incident in Seoul’s Itaewon district, and uses public interest in this tragedy to retrieve exploits for vulnerabilities when the file is opened. This attack is made possible by the fact that Office uses Internet Explorer to render HTML content.

A successful exploit delivers a shellcode that wipes all traces by clearing Internet Explorer’s cache and history and downloading the next stage payload.

Google TAG says it was unable to recover subsequent malware used in the campaign, but is suspected to have been involved in deploying RokRat, BLUELIGHT, or Dolphin.

Did you find this article interesting?Please follow us twitter โ—‹ When LinkedIn To read more exclusive content that we post.

cropped-BTA_Logo-B-1-scaled-1
YOUR FUTURE STARTS HERE.

BLUE TRAINING ACADEMY

Register now for our membership to gain access to our elite training program and fast forward your career today!

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

cropped-BTA_Logo-B-1-scaled-1
Security Blog

Blue Training Academy

Blue Training Academy was developed in 2018 as a educational and training facility for continuing education and certification courses. Blue Training Academy is an educational institution that allows for all sectors of the public and Criminal Justice field to gain ongoing training and education.

Copyright ยฉ๏ธ All rights reserved. | Blue Training Academy Blog