Hackers Attacking Windows Users With Internet Explorer Zero-Day Vulnerability

by Esmeralda McKenzie
Hackers Attacking Windows Users With Internet Explorer Zero-Day Vulnerability

Hackers Attacking Windows Users With Internet Explorer Zero-Day Vulnerability

Hackers Attacking Dwelling windows Customers With Web Explorer Zero-Day Vulnerability

Hackers target professional A long way off Monitoring and Management (RMM) instruments as they provide highly effective, trusted earn entry to to methods and networks.

This would presumably facilitate the trendy and ambiance pleasant deployment of malware across an organization’s infrastructure.

EHA

Cybersecurity researchers at CheckPoint not too long ago stumbled on that hackers have been actively attacking Dwelling windows users with Web Explorer zero-day vulnerability.

Model Micro stumbled on CVE-2024-38112, an MHTML a ways away code execution vulnerability exploited by APT group Void Banshee.

Web Explorer Zero-Day Vulnerability

The attack chain abuses web shortcuts and Microsoft protocol handlers, along side MHTML, to earn entry to disabled Web Explorer and pause malicious code.

This vulnerability is extinct to bring the Atlantida stealer, full of life since January 2024, focused on North The United States, Europe, and Southeast Asia for files theft and monetary originate.

Attack%20chain%20of%20the%20CVE 2024 38112%20zero day%20campaign%20(Source%20 %20Trend%20Micro)
Attack chain of the CVE-2024-38112 zero-day advertising campaign (Offer – Model Micro)

Despite Web Explorer’s (IE) reliable pause of strengthen and disabling, its leftovers persist in smartly-liked Dwelling windows methods.

Void Banshee exploited CVE-2024-38112, a vulnerability such as CVE-2021-40444, the verbalize of specially crafted URL files with MHTML protocol handlers and x-usc directives to earn entry to and lag HTA files thru the disabled IE process.

This vogue bypasses IE’s discontinuation, exploiting its historically massive attack flooring. Microsoft patched this vulnerability in July 2024 by unregistering the MHTML handler from IE, reads the epic.

Void Banshee exploited CVE-2024-38112 by planting a malicious URL file that had been disguised as a PDF to govt mavens and college students.

Sample%20book%20lure%20(Source%20 %20Trend%20Micro)
Sample e book entice (Offer – Model Micro)

To earn entry to disabled Web Explorer, an HTA file is downloaded, VBScript is carried out, and MHTML protocol handlers and x-usc directives are utilized in the attack chain.

This culminates in invoking LoadToBadXml, a .NET Trojan loader, which then injects the Atlantida stealer into RegAsm.exe.

Atlantida%20stealer%E2%80%99s%20collected%20data%20(Source%20 %20Trend%20Micro)
Atlantida stealer’s clean files (Offer – Model Micro)

The originate-offer stealers-essentially based mostly Atlantida’s enormous sequence contains gathering in depth confidential files from thoroughly different functions, browsers, and system areas by compressing it and transmitting it thru TCP to the attacker.

The malware packs all clean files into a ZIP file after which tunnels it over TCP port 6655 to the attacker’s C&C server.

Despite Web Explorer being disabled, attackers exploit its final presence to set up ransomware and thoroughly different dreadful system.

Void Banshee is an instance of an APT group that makes verbalize of unpatched products and services to spotlight a foremost safety anguish.

Like a flash response time blended with complex safety solutions is very urged for breach decision and methods safeguarding.

Source credit : cybersecuritynews.com

Related Posts