Even with North Korea acting on the world stage of diplomacy this week, a new report by AlienVault has found the regime fighting in the cyberwar trenches as well. This time it is with an ActiveX zero-day exploit that has shown up on a South Korean site.
South Korea is unusual in that the country mandates the use of ActiveX controls for websites, while many other sites have disabled these tools. This leaves the republic vulnerable to such attacks, which might not succeed elsewhere.
The South Korean website -- the Sejong Institute -- where the exploit was found is a think tank that focuses on national security issues.
The first step that AlienVault describes happening is a profiling script designed to get information on the possible targets for an attack. This is typical behavior for many nation-state threat actors, and something that the Lazarus Group -- the actor thought to be at work here, and one that is tied to the North Korean government -- routinely does.
The profiling may have occurred a year before actual malware injection did.
Then, other scripts perform more detailed profiling followed by the actual delivery of the ActiveX exploit.
The profiler identifies which browser and operating system the user is running. AlienVault researchers found that much of the code is taken from PinLady's Plugin-Detect. This means that if a target is running Internet Explorer, it checks if it is enabled to run ActiveX, as well as what plugins are enabled from a very specific list.
The list includes EasyPayPlugin.EPplugin, ACUBEFILECTRL.AcubeFileCtrlCtrl.1 and DUZONERPSSO.DUZONERPSSOCtrl.1.
The ActiveX exploit is done with a JavaScript (VBScript) written to temp.vbs to download and install the malware (named splwow32.exe).
The malware's file name is the same as that of malware used in a Taiwan bank heist that has been attributed to Lazarus, further giving credence that the group is behind this latest attack.
The installed malware -- Akdoor -- is described by the researchers as "a simple backdoor that executes commands over the command prompt. It has a distinctive command and control protocol."
The victim machine sends a confirmation message to the command and control server (C&C) when it is fully infected.
AlienVault notes that the C&C server used for this signaling has previously been identified as a C&C server for Lazarus malware in 2015.
The observed timing of these attacks -- identified by issuemakerlabs on Twitter -- is interesting. It shows the first profiling happening a year previous to injections. Two injections of the malware were done a week before the 3rd Inter-Korea Summit of 2018 in April. In this summit, the South and the North agreed to cease all hostilities against the other side.
North Korea's Watering Hole Attack History (case, Sejong Institute) pic.twitter.com/E3mscFMyYd
— Simon Choi (@issuemakerslab) May 24, 2018
The third injection of the malware to the Sejong Institue was done a week after the summit.
It seems that no matter what diplomacy is being acted out, the threat actors of North Korea remain active.
Related posts:
— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.