Logo Logo
  • Home
  • Services
    • Security Assessment Services
      • Web Application Penetration Testing
      • Mobile Application Penetration Testing
      • Network Infrastructure Security Assessment
      • Source Code Review
      • Cloud Security Assessment
      • Digital Forensics, Incident Response & Malware Analysis Services
    • Specialized Services
      • Red Teaming Assessments
      • Virtual CISO – CISO As A Service/ Function
      • Total Talent Solutions & Workforce Management
    • Consulting & Compliance
      • Compliance
    • SOC As A Service
      • Security Operation Center – PSY9 SOC
  • About Us
  • Blogs
  • Contact Us

  • About Us
  • Blogs
  • Cloud Security Assessment
  • Compliance
  • Contact Us
  • Digital Forensics, Incident Response & Malware Analysis Services
  • Home Version Eight
  • Mobile Application Penetration Testing
  • Network Infrastructure Security Assessment
  • Page With Default Template
  • Red Teaming Assessments
  • Security Operation Center – PSY9 SOC
  • Source Code Review
  • Total Talent Solutions & Workforce Management
  • Virtual CISO – CISO As A Service/ Function
  • Web Application Penetration Testing

Google has warned users for Internet Explorer Zero-Day Vulnerability Exploited by ScarCruft Hackers

  • Home
  • Blog Details
December 10 2022
  • PSY9

An Internet Explorer zero-day vulnerability was actively exploited by a North Korean threat actor or Hacker to target South Korean users by capitalizing on the recent Itaewon Halloween crowd crush by tricking its users into accidentally downloading malware.

This discovery was reported by Google Threat Analysis Group (TAG) researchers Benoît Sevens and Clément Lecigne, is the latest set of attacks perpetrated by ScarCruft, which is also called APT37, InkySquid, Reaper, and Ricochet Chollima.

“The group has historically focused and have targeted South Korean users along with North Korean defectors, policy makers, journalists as well as human rights activists,” TAG claimed in Thursday analysis.

The new findings illustrate the threat actor’s continued abuse of Internet Explorer flaws such as CVE-2020-1380 and CVE-2021-26411 to drop backdoors like BLUELIGHT and Dolphin, the latter of which was disclosed by Slovak cybersecurity firm ESET late previous month.Another key tool in its arsenal was said to be RokRat, a Windows-based remote access trojan which comes with a wide range of functions that allow it to capture screenshots, log keystrokes, and even harvest Bluetooth device information etc.

The attack chain observed by Google TAG entails the use of a malicious Microsoft Word document that was uploaded to VirusTotal on October 31, 2022. It abuses yet another Internet Explorer zero-day flaw in the JScript9 JavaScript engine, CVE-2022-41128, that was patched by Microsoft last month.

The file references the October 29 incident that took place in the Itaewon neighborhood of Seoul and exploits public interest in the tragedy to retrieve an exploit for the vulnerability upon opening it. The attack is enabled by the fact that Office renders HTML content using Internet Explorer.

Malware Hunter Team points out, the same Word file was previously shared by the Shadow Chaser Group on October 31, 2022, describing it as an “interesting DOCX injection template sample” that originated from Korea.

Successful exploitation is followed by the delivery of a shellcode that wipes all traces by clearing the Internet Explorer cache and history as well as downloading the next stage payload which is dangerous.

Google TAG said it could not recover the follow-on malware used in the campaign, although it’s suspected to have involved the deployment of RokRat, BLUELIGHT, or Dolphin.

Previous Post Next Post

Leave a Comment Cancel reply

Recent Posts

  • PSY9 Security Consulting Pvt Ltd is now Cert-In Empanelled Organization
  • Microsoft bug that used forged Azure AD tokens allowed hackers to compromise over two dozen organizations.
  • PSY9 Security Consulting Pvt Ltd, a leading cybersecurity firm in India, has announced a strategic partnership with NS Advance Oy, a Finnish cybersecurity company. This collaboration aims to enhance PSY9’s offshore delivery capabilities and expand its service offerings in the Indian market.
  • Google has warned users for Internet Explorer Zero-Day Vulnerability Exploited by ScarCruft Hackers
  • What is Metaverse Cyber Security and How Does it Work?

Recent Comments

No comments to show.

Archives

  • January 2025
  • July 2023
  • February 2023
  • December 2022

Categories

  • PSY9

Categories

  • PSY9
Logo

Where Energy is Conserved ! Connect with us, Analyse your threats and see how mature your organization and where you stand against ever growing Risks.

Protect II Prevent II Secure II Defend

Usefull Links

  • Google has warned users for Internet…
  • What is Metaverse Cyber Security…
  • Online scams: An overview & 20 types…

Services

  • PSY9 SOC
  • Virtual CISO
  • Talent Management
  • Red Teaming
  • Compliance

Contact Info

Address : 803, Gala Empire, Opp Door-Darshan Tower, Thaltej, Ahmedabad, Gujarat - 380059, India

  • Email: [email protected] II [email protected]
  • Contact: 8160281166 II 7096878888

© Copyright 2022. Psy9.