Korean hackers spread viruses through Internet Explorer

North Korean hackers have found a way to distribute malware through the old Internet Explorer browser. Although this browser has been officially disabled, its components continue to exist thanks to a special mode in Microsoft Edge. The attack occurs without any participation from the user.

Image Source: Rubaitul Azad/Unsplash

According to a joint report from South Korea’s National Cyber ​​Security Center (NCSC) and local IT security provider AhnLab, attackers used a previously unknown zero-day vulnerability in Internet Explorer to distribute malware to users in South Korea. Despite disabling Internet Explorer on Windows PCs, elements of the browser function through third-party applications installed on the computer, and there is also an IE mode in the Edge browser, thereby opening the door to attack, PCMag explains.

The incident occurred in May of this year. A group of hackers known as APT 37 or ScarCruft exploited an Internet Explorer vulnerability to carry out large-scale malicious activities. According to a report from NCSC and AhnLab, hackers compromised the server of a South Korean online advertising agency, which allowed them to download malicious code through pop-up advertising windows. “This vulnerability is exploited when adware downloads and displays advertising content,” says the AhnLab report. “The result is a zero-click attack that requires no user interaction.”

Image source: AhnLab

The researchers also noted that many South Korean users install free software such as antivirus and other utilities that display an advertising window in the bottom right corner of the screen. However, the problem is that such programs often use modules associated with Internet Explorer, which allowed hackers to distribute RokRAT malware, designed to execute remote commands and steal data from victims’ computers.

In August, Microsoft released a patch to fix a zero-day vulnerability coded CVE-2024-38178. However, as BleepingComputer notes, there is a risk that hackers may find other ways to exploit Internet Explorer components as they continue to be used in Windows and third-party applications.

admin

Share
Published by
admin

Recent Posts

NVIDIA AI servers will help manage nuclear power plants in California

California utility operator Pacific Gas and Electric Company (PG&E) intends to build a campus of…

3 hours ago

Musk skims the cream after the US elections: SpaceX was valued at $250 billion, and the value of xAI soared to $45 billion

Two private companies of Elon Musk, SpaceX and xAI, will soon dramatically increase their capitalization…

3 hours ago

Frostpunk 2 benefit and record figures: 11 bit studios reported success in 2024

Polish publisher and developer 11 bit studios reported results for the first nine months of…

3 hours ago

The court sentenced the hacker who stole almost 120,000 bitcoins to five years in prison

Hacker Ilya Lichtenstein, known under the nickname "Dutch", was sentenced to five years in prison…

3 hours ago

The US allocated $6.6 billion to TSMC under the “Chip Act”

The US Department of Commerce said it has completed the allocation of a government subsidy…

3 hours ago