North Korean Hackers Exploit Microsoft Zero-Day: APT37’s “Code-on-Toast” Attack Uncovered

1 day ago 4
BOOK THIS SPACE FOR AD
ARTICLE AD

WIRE TOR

🚨 North Korean Hackers Exploit Microsoft Zero-Day: APT37’s “Code-on-Toast” Attack Uncovered 🍞🖥

⚠️ APT37, a North Korean state-sponsored cyber threat group, has launched a sophisticated zero-click attack using a Microsoft Internet Explorer vulnerability (CVE-2024–38178) on South Korean targets. These hackers, also known as RedAnt, RedEyes, or ScarCruft, exploited Toast ad programs, which use IE-based WebView to render ads. This flaw allowed them to deliver malware to unsuspecting users without any interaction.

🔥 The Attack in Action: By compromising a digital ad agency, APT37 injected malicious code into Toast ad scripts, turning them into vehicles for malware delivery instead of ads. This attack, dubbed “Code-on-Toast,” spread RokRAT, a notorious data-stealing malware, allowing remote commands and persistent malicious activities.

💡 Key Tactics:

Zero-Click Exploit: No user interaction is needed.Malware Delivery: Infecting systems with RokRAT through Toast pop-ups.Stealth Approach: Utilizing commercial cloud servers for command and control.

🌐 Legacy Threats Still in Play: Although Internet Explorer officially ended in 2022, it continues to be a weak link in many systems. Wire Tor recommends keeping all software updated and avoiding outdated modules like IE-based WebView.

🔐 Wire Tor Can Help: Stay protected from advanced cyber threats with our penetration testing services:

Network Security 🛡️Web & Mobile Application Testing 🌐📱Cloud Security Testing ☁️

🎯 Reach out to Wire Tor Security Solutions for expert cybersecurity services. We’re here to help you fortify your defenses against sophisticated attacks like APT37.

📞 Contact Us: Wire Tor Security Solutions

WireTor — Keeping Your Digital Space Secure. 🌍

Read Entire Article