Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management

6/13/2018
08:05 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Lazarus Suspected of Attacking South Korea Sites With Zero-Day Exploit

The North Korea-linked Lazarus Group is suspected of using a flaw in ActiveX to attack websites in South Korea, according to research from AlienVault.

Even with North Korea acting on the world stage of diplomacy this week, a new report by AlienVault has found the regime fighting in the cyberwar trenches as well. This time it is with an ActiveX zero-day exploit that has shown up on a South Korean site.

South Korea is unusual in that the country mandates the use of ActiveX controls for websites, while many other sites have disabled these tools. This leaves the republic vulnerable to such attacks, which might not succeed elsewhere.

The South Korean website -- the Sejong Institute -- where the exploit was found is a think tank that focuses on national security issues.

The first step that AlienVault describes happening is a profiling script designed to get information on the possible targets for an attack. This is typical behavior for many nation-state threat actors, and something that the Lazarus Group -- the actor thought to be at work here, and one that is tied to the North Korean government -- routinely does.

The profiling may have occurred a year before actual malware injection did.

Then, other scripts perform more detailed profiling followed by the actual delivery of the ActiveX exploit.

The profiler identifies which browser and operating system the user is running. AlienVault researchers found that much of the code is taken from PinLady's Plugin-Detect. This means that if a target is running Internet Explorer, it checks if it is enabled to run ActiveX, as well as what plugins are enabled from a very specific list.

The list includes EasyPayPlugin.EPplugin, ACUBEFILECTRL.AcubeFileCtrlCtrl.1 and DUZONERPSSO.DUZONERPSSOCtrl.1.

The ActiveX exploit is done with a JavaScript (VBScript) written to temp.vbs to download and install the malware (named splwow32.exe).

The malware's file name is the same as that of malware used in a Taiwan bank heist that has been attributed to Lazarus, further giving credence that the group is behind this latest attack.

The installed malware -- Akdoor -- is described by the researchers as "a simple backdoor that executes commands over the command prompt. It has a distinctive command and control protocol."

The victim machine sends a confirmation message to the command and control server (C&C) when it is fully infected.


Now entering its fifth year, the 2020 Vision Executive Summit is an exclusive meeting of global CSP executives focused on navigating the disruptive forces at work in telecom today. Join us in Lisbon on December 4-6 to meet with fellow experts as we define the future of next-gen communications and how to make it profitable.

AlienVault notes that the C&C server used for this signaling has previously been identified as a C&C server for Lazarus malware in 2015.

The observed timing of these attacks -- identified by issuemakerlabs on Twitter -- is interesting. It shows the first profiling happening a year previous to injections. Two injections of the malware were done a week before the 3rd Inter-Korea Summit of 2018 in April. In this summit, the South and the North agreed to cease all hostilities against the other side.

The third injection of the malware to the Sejong Institue was done a week after the summit.

It seems that no matter what diplomacy is being acted out, the threat actors of North Korea remain active.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17452
PUBLISHED: 2020-08-09
flatCore before 1.5.7 allows upload and execution of a .php file by an admin.
CVE-2020-17451
PUBLISHED: 2020-08-09
flatCore before 1.5.7 allows XSS by an admin via the acp/acp.php?tn=pages&sub=edit&editpage=1 page_linkname, page_title, page_content, or page_extracontent parameter, or the acp/acp.php?tn=system&sub=sys_pref prefs_pagename, prefs_pagetitle, or prefs_pagesubtitle parameter.
CVE-2020-17447
PUBLISHED: 2020-08-09
MyBB before 1.8.24 allows XSS because the visual editor mishandles [align], [size], [quote], and [font] in MyCode.
CVE-2020-16248
PUBLISHED: 2020-08-09
** DISPUTED ** Prometheus Blackbox Exporter through 0.17.0 allows /probe?target= SSRF. NOTE: follow-on discussion suggests that this might plausibly be interpreted as both intended functionality and also a vulnerability.
CVE-2020-15820
PUBLISHED: 2020-08-08
In JetBrains YouTrack before 2020.2.6881, the markdown parser could disclose hidden file existence.