16 October 2024

North Korean APT37 exploited IE zero-day to infect targets with malware


North Korean APT37 exploited IE zero-day to infect targets with malware

A North Korea-backed threat actor has been observed exploiting a recently patched zero-day vulnerability in Microsoft Windows to spread malware.

Known as APT37, TA-RedAnt, ScarCruft, RedEyes, InkySquid, Reaper, Ricochet Chollima, Ruby Sleet and Group123, the threat actor was previously observed targeting specific individuals such as North Korean defectors and experts in North Korean affairs using hacking emails, Android app package file (.apk), and IE vulnerabilities. The group's primary objective remains the acquisition of strategic intelligence, with a focus on non-public cyber threat intelligence and defense strategies.

In its most recent campaign codenamed ‘Operation Code on Toast,’ by the AhnLab Security Intelligence Center (ASEC) and the National Cyber Security Center (NCSC) of the Republic of Korea, APT37 exploited a now patched zero-day vulnerability (CVE-2024-38178) that can be abused by a remote attacker for remote code execution via a specially crafted webpage in Microsoft Edge in Internet Explorer mode. Microsoft patched this flaw as part of its August 2024 Patch Tuesday.

According to ASEC, the threat actor took advantage of “a specific 'toast' advertisement program that is commonly bundled with various free software.” In Korea, ‘toast’ refers to a type of popup notification that appears at the bottom of the desktop screen.

“Many toast ad programs use a feature called WebView to render web content for displaying ads. However, WebView operates based on a browser. Therefore, if the program creator used IE-based WebView to write the code, IE vulnerabilities could also be exploited in the program,” the researchers explained. “As a result, TA-RedAnt exploited the toast ad program that were using the vulnerable IE browser engine (jscript9.dll), which is no longer supported, as an initial access vector. Microsoft ended its support for IE in June 2022. However, attacks that target some Windows applications that still use IE are continuously being discovered, so organizations and users need to be extra cautious and update their systems with the latest security patches.”

The attackers first compromised the server of the Korean online advertising agency and injected malicious code in the server’s ad content script. The attack then exploited CVE-2024-38178 to trick victims into downloading malware on their desktops with the toast ad program installed.

In other news, the US Cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities (KEV) catalog to add a critical SolarWinds Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987), indicating that the issue id being exploited in the wild.

Back to the list

Latest Posts

Nation-state hackers increasingly collaborate with cybercrooks to gather intelligence

Nation-state hackers increasingly collaborate with cybercrooks to gather intelligence

Russian state-backed hackers have been outsourcing cyberespionage tasks to cybercriminals, particularly those targeting Ukraine.
16 October 2024
North Korean APT37 exploited IE zero-day to infect targets with malware

North Korean APT37 exploited IE zero-day to infect targets with malware

The attackers first compromised the server of the Korean online advertising agency and injected malicious code in the server’s ad content script.
16 October 2024
Finnish authorities dismantle Sipulitie darknet marketplace, seize servers

Finnish authorities dismantle Sipulitie darknet marketplace, seize servers

The online marketplace, which served both Finnish and English-speaking users, boasted a turnover of €1.3 million.
16 October 2024