North Korean hackers target South Korea with Internet Explorer vulnerabilities to deploy RokRAT malware

Hacker raise hands up to control computer coding, 3D rendering.
(Image credit: Shutterstock)

  • South Korean citizens were hit with a zero-click malware from the North
  • The malware used pop-up ads to install payloads
  • Keyloggers and other malicious surveillance software was also installed

North Korean state-linked hacker ScarCruft recently conducted a large-scale cyber-espionage campaign using an Internet Explorer zero-day flaw to deploy RokRAT malware, experts have warned.

The group, also known as APT37 or RedEyes, is a North Korean state-sponsored hacking group known for cyber-espionage activities.

This group typically focuses on South Korean human rights activists, defectors, and political entities in Europe.

Internet Explorer Zero-Day flaw exploited

Over the years, ScarCruft has developed a reputation for using advanced techniques such as phishing, watering hole attacks, and exploiting zero-day vulnerabilities in software to infiltrate systems and steal sensitive information.

Their latest campaign, dubbed "Code on Toast," was revealed in a joint report by South Korea's National Cyber Security Center (NCSC) and AhnLab (ASEC). This campaign used a unique method involving toast pop-up ads to deliver zero-click malware infections.

The innovative aspect of this campaign lies in how ScarCruft used toast notifications - small pop-up ads displayed by antivirus software or free utility programs - to spread their malware.

ScarCruft compromised a domestic advertising agency’s server in South Korea to push malicious "Toast ads" through a popular but unnamed free software used by many South Koreans.

These malicious ads included a specially crafted iframe that triggered a JavaScript file named ‘ad_toast,’ which executed the Internet Explorer zero-day exploit. By using this zero-click method, ScarCruft was able to silently infect systems without user interaction.

The high-severity vulnerability in Internet Explorer used in this attack is tracked as CVE-2024-38178 and has been given a severity score of 7.5. The flaw exists in Internet Explorer’s JScript9.dll file, part of its Chakra engine, and allows remote code execution if exploited. Despite Internet Explorer’s official retirement in 2022, many of its components remain embedded in Windows or third-party software, making them ripe targets for exploitation.

ScarCruft’s use of the CVE-2024-38178 vulnerability in this campaign is particularly alarming because it closely resembles a previous exploit they used in 2022 for CVE-2022-41128. The only difference in the new attack is an additional three lines of code designed to bypass Microsoft’s earlier security patches.

Once the vulnerability is exploited, ScarCruft delivers RokRAT malware to the infected systems. RokRAT is primarily used to exfiltrate sensitive data with the malware targeting files with specific extensions like .doc, .xls, .ppt, and others, sending them to a Yandex cloud every 30 minutes. In addition to file exfiltration, RokRAT has surveillance capabilities, including keylogging, clipboard monitoring, and screenshot capture every three minutes.

The infection process consists of four stages, with each payload injected into the ‘explorer.exe’ process to evade detection. If popular antivirus tools like Avast or Symantec are found on the system, the malware is instead injected into a random executable from the C:\Windows\system32 folder. Persistence is maintained by placing a final payload, ‘rubyw.exe,’ in the Windows startup and scheduling it to run every four minutes.

Via BleepingComputer

You might also like

TOPICS
Efosa Udinmwen
Freelance Journalist

Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master's and a PhD in sciences, which provided him with a solid foundation in analytical thinking. Efosa developed a keen interest in technology policy, specifically exploring the intersection of privacy, security, and politics. His research delves into how technological advancements influence regulatory frameworks and societal norms, particularly concerning data protection and cybersecurity. Upon joining TechRadar Pro, in addition to privacy and technology policy, he is also focused on B2B security products. Efosa can be contacted at this email: udinmwenefosa@gmail.com

Read more
A digital representation of a lock
Looking for a new job? Watch out you don't fall for this new malware scam
Hacker silhouette working on a laptop with North Korean flag on the background
North Korean Lazarus hackers are targeting nuclear workers
North Korean flag with a hooded hacker
North Korean hackers are posing as software development recruiters to target freelancers
A digital representation of a lock
Security experts are being targeted with fake malware discoveries
Hacker silhouette working on a laptop with North Korean flag on the background
North Korean hackers are targeting LinkedIn jobseekers with new malware - here's how to stay safe
Image of laptop infected with malware threat
This devious new macOS malware disguises itself as Chrome, Zoom installers
Latest in Pro
Woman shocked by online scam, holding her credit card outside
Cybercriminals used vendor backdoor to steal almost $600,000 of Taylor Swift tickets
Customer service 3D manager concept. AI assistance headphone call center
The era of Agentic AI
Woman using iMessage on iPhone
UK government guidelines remove encryption advice following Apple backdoor spat
Cryptocurrencies
Ransomware’s favorite Russian crypto exchange seized by law enforcement
A hand reaching out to touch a futuristic rendering of an AI processor.
Balancing innovation and security in an era of intensifying global competition
Wordpress brand logo on computer screen. Man typing on the keyboard.
Thousands of WordPress sites targeted with malicious plugin backdoor attacks
Latest in News
Apple iPhone 16 Review
Three iPhone 17 model dummy units appear in a hands-on video leak
The Samsung Galaxy S25 Edge on display the January 22, 2025 Galaxy Unpacked event.
New Samsung Galaxy S25 Edge may have revealed some key details – including its price
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 9 (game #1140)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 9 (game #371)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 9 (game #637)
WhatsApp
WhatsApp just made its AI impossible to avoid – but at least you can turn it off