Hackers used new Home windows Defender zero-day to drop DarkMe malware

Microsoft has patched nowadays a Home windows Defender SmartScreen zero-day exploited within the wild by way of a financially motivated danger team to deploy the DarkMe faraway get entry to trojan (RAT).

The hacking team (tracked as Water Hydra and DarkCasino) was once noticed the use of the zero-day (CVE-2024-21412) in assaults on New 12 months’s Eve day by way of Development Micro safety researchers.

“An unauthenticated attacker may ship the focused consumer a specifically crafted report this is designed to circumvent displayed safety tests,” Microsoft stated in a safety advisory issued nowadays.

“Alternatively, the attacker would haven’t any method to drive a consumer to view the attacker-controlled content material. As an alternative, the attacker must persuade them to do so by way of clicking at the report hyperlink.”

Development Micro safety researcher Peter Girnus, credited for reporting this zero-day, published that the CVE-2024-21412 flaw bypasses every other Defender SmartScreen vulnerability (CVE-2023-36025).

CVE-2023-36025 was once patched right through the November 2023 Patch Tuesday, and, as Development Micro published closing month, it was once additionally exploited to circumvent Home windows safety activates when opening URL information to deploy the Phemedrone info-stealer malware.

Dormann CVE-2024-21412 Windows SmartScreen bypass

0-day used to focus on monetary marketplace buyers

The zero-day that Microsoft patched nowadays was once utilized in assaults concentrated on “foreign currency buyers taking part within the high-stakes forex buying and selling marketplace,” with the most probably finish purpose being information robbery or ransomware deployment at a later degree.

“In overdue December 2023, we started monitoring a marketing campaign by way of the Water Hydra team that contained equivalent gear, techniques, and procedures (TTPs) that concerned abusing web shortcuts (.URL) and Internet-based Dispensed Authoring and Versioning (WebDAV) elements,” Development Micro defined.

“We concluded that calling a shortcut inside of every other shortcut was once enough to evade SmartScreen, which did not correctly practice Mark-of-the-Internet (MotW), a crucial Home windows element that indicators customers when opening or operating information from an untrusted supply.”

Water Hydra exploited CVE-2024-21412 to focus on foreign currency trading boards and inventory buying and selling Telegram channels in spearphishing assaults, pushing a malicious inventory chart linking to a compromised buying and selling data website online from Russia (fxbulls[.]ru) impersonating a foreign exchange dealer platform (fxbulls[.]com).

The attackers’ purpose was once to trick focused buyers into putting in the DarkMe malware by way of social engineering.

Ways they used come with posting messages in English and Russian inquiring for or providing buying and selling steering and disseminating counterfeit inventory and monetary gear associated with graph technical research and graph indicator gear.

An entire listing of signs of compromise (IoCs) for this newly seen DarkMe malware marketing campaign is to be had right here.

The Water Hydra hackers have exploited different zero-day vulnerabilities up to now. For example, they used a high-severity vulnerability (CVE-2023-38831) within the WinRAR instrument utilized by over 500 million customers to compromise buying and selling accounts a number of months ahead of a patch was once to be had.

Different distributors later related CVE-2023-38831 exploitation to a couple of government-backed hacking teams, together with the Sandworm, APT28, APT40, DarkPink (NSFOCUS), and Konni (Knownsec) danger teams from Russia, China, and North Korea.

Leave a Comment

Your email address will not be published. Required fields are marked *