Categories: Malware

North Korean Hacker Group Uses Browser Exploits to Deliver a Custom Malware

The security experts of the cybersecurity firm, Volexity have recently reported an attack through which the North Korean Hacker Group using browser exploits to deploy the customer malware on the website.

It’s a very well-known North Korean hacker group that was behind this attack, not only this but they also have a limited number of victims utilizing exploits for vulnerabilities in a web browser to deliver custom malware.

The threat group behind this attack was called InkySquid, and they are using this exploit since 2020 in attacks against the Internet Explorer browser to download obfuscated Javascript code that is generally hidden inside the legitimate code.

SWC Activity

According to the security researchers, in April 2021 Volexity has recognized suspicious code that was loaded through www.dailynk[.]com to ill-disposed subdomains of jquery[.]services. 

There are two types of URLs that have been found, and that’s why we have mentioned them below:-

  • hxxps://www.dailynk[.]com/wp-includes/js/jquery/jquery.min.js?ver=3.5.1
  • hxxps://www.dailynk[.]com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2

The threat actors’ attacks have involved code that was only attached for a very short period of time, and soon after the operation, it was quickly removed. 

According to the report of the analysts, making a description of this activity is quite difficult as the ill-disposed content was hard to identify.

Security flaws

  • CVE-2020-1380 (CVSS score: 7.5) – Scripting Engine Memory Corruption Vulnerability

Initially, Volexity was able to recognize the malicious code, and the threat actor was seen using the CVE-2020-1380, an exploit for Internet Explorer.

  • CVE-2021-26411 (CVSS score: 8.8) – Internet Explorer Memory Corruption Vulnerability

This CVE was used, in another exploit that is targeting the Internet Explorer as well as the legacy versions of Microsoft Edge. However, the redirect code was fixed up in a similar way as it was placed in the CVE-2020-1380.

Subdirectory names used

Below we have mentioned the subdirectory names used by the hackers:-

  • logo
  • normal
  • background
  • theme
  • round

Data gathered

Here’s the list of data that were gathered by the threat actors:-

  • Username
  • Computer name
  • OS version
  • Web IP
  • Local IP of default interface
  • LocalTime
  • Whether the implant binary is 32 or 64 bit
  • Process SID authority level
  • Process filename
  • List of AV products installed
  • Whether the infected machine has VM tools running

BLUELIGHT

The threat actors have implemented many attacks, and that’s why they have used a different subdomain of jquery[.]services so that they can host a new and novel malware family.

The security researchers pronounced that the “history” file was an XOR-encoded (0xCF) copy of a custom malware family and both the malware developer as well as the Volexity assign to as BLUELIGHT. 

The BLUELIGHT is generally used as a secondary payload that normally follows the successful performance of the Cobalt Strike. However, these strikes were generally used as an initial payload in both cases of exploitation.

In BLUELIGHT’s operations, the threat actors generally used the Microsoft Graph API for Microsoft 365, Office, and other services. As per the report of Volexity, a North Korean threat group, named as ScarCruft or APT37, is also behind the InkySquid attacks. 

Moreover, the experts are trying their best to know all the key details of this attack, and how it has been initiated so that they will easily bypass this kind of attack in the future.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable new…

30 minutes ago

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched Check…

2 hours ago

PingAM Java Agent Vulnerability Allows Attackers to Bypass Security

A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s PingAM…

3 hours ago

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data

A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software has…

4 hours ago

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000 malicious…

6 hours ago

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files

A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in Taiwan…

6 hours ago