Korean hackers spread viruses through Internet Explorer

North Korean hackers have found a way to distribute malware through the old Internet Explorer browser. Although this browser has been officially disabled, its components continue to exist thanks to a special mode in Microsoft Edge. The attack occurs without any participation from the user.

Image Source: Rubaitul Azad/Unsplash

According to a joint report from South Korea’s National Cyber ​​Security Center (NCSC) and local IT security provider AhnLab, attackers used a previously unknown zero-day vulnerability in Internet Explorer to distribute malware to users in South Korea. Despite disabling Internet Explorer on Windows PCs, elements of the browser function through third-party applications installed on the computer, and there is also an IE mode in the Edge browser, thereby opening the door to attack, PCMag explains.

The incident occurred in May of this year. A group of hackers known as APT 37 or ScarCruft exploited an Internet Explorer vulnerability to carry out large-scale malicious activities. According to a report from NCSC and AhnLab, hackers compromised the server of a South Korean online advertising agency, which allowed them to download malicious code through pop-up advertising windows. “This vulnerability is exploited when adware downloads and displays advertising content,” says the AhnLab report. “The result is a zero-click attack that requires no user interaction.”

Image source: AhnLab

The researchers also noted that many South Korean users install free software such as antivirus and other utilities that display an advertising window in the bottom right corner of the screen. However, the problem is that such programs often use modules associated with Internet Explorer, which allowed hackers to distribute RokRAT malware, designed to execute remote commands and steal data from victims’ computers.

In August, Microsoft released a patch to fix a zero-day vulnerability coded CVE-2024-38178. However, as BleepingComputer notes, there is a risk that hackers may find other ways to exploit Internet Explorer components as they continue to be used in Windows and third-party applications.

admin

Share
Published by
admin

Recent Posts

Ireland to Probe Legality of Training Grok AI Model on Europeans’ X Posts

The Irish regulator has launched an investigation into Elon Musk's social network X over its…

7 hours ago

Perm Polytechnic University has figured out how to transmit data inside a well via drilling mud

Perm National Research Polytechnic University reported that its scientists have turned the drilling fluid inside…

7 hours ago

Baldur’s Gate 3’s Latest Major Update Finally Has a Release Date — Not Long to Wait

Developers from the Belgian Larian Studios have announced the release date of the eighth major…

8 hours ago

Japan Out of MicroSD Express Memory Cards as Resellers Prepare for Switch 2 Release

According to online sources, microSD Express memory cards have sold out at e-commerce stores across…

8 hours ago

Baldur’s Gate 3’s Latest Major Update Finally Has a Release Date — Not Long to Wait

Developers from the Belgian Larian Studios have announced the release date of the eighth major…

8 hours ago

Japan Out of MicroSD Express Memory Cards as Resellers Prepare for Switch 2 Release

According to online sources, microSD Express memory cards have sold out at e-commerce stores across…

8 hours ago