Cyber Security News

RDP and MS Office Vulnerabilities Abused by Kimusky in Targeted Intrusions

The AhnLab SEcurity intelligence Center (ASEC) has released a detailed analysis of a sophisticated cyber campaign dubbed “Larva-24005,” linked to the notorious North Korean hacking group Kimsuky.

This operation has been targeting critical sectors in South Korea, including software, energy, and financial industries since October 2023.

MS Office VulnerabilitiesMS Office Vulnerabilities
Attack Method

Targeted Industries and Global Attack Vectors

The Larva-24005 operation focuses heavily on South Korean entities but has expanded its reach to include systems in the United States, China, Japan, Germany, Singapore, and several other nations.

The campaign leverages a range of advanced tools and techniques to infiltrate these systems, exploiting vulnerabilities such as the infamous RDP vulnerability known as BlueKeep (CVE-2019-0708).

According to the Report, initial access to compromised systems was achieved through the exploitation of the BlueKeep RDP vulnerability.

Forensic evidence indicates that while RDP vulnerability scanners were present, there was no confirmed utilization in the actual breaches.

Instead, the attackers used a mix of phishing emails and other exploit vectors to deliver their payload.

variants developed from 2019 to 2024.

Phishing emails, sent to targets in South Korea and Japan, contained malicious attachments that exploited the Microsoft Office Equation Editor vulnerability (CVE-2017-11882), further enabling malware distribution.

Malware Ecosystem and System Proliferation

Once within the network, the threat actors employed droppers to install various malware suites:

  • RDPWrap: Facilitates persistent remote access by modifying system settings.
  • MySpy: Collects system information.
  • KimaLogger and RandomQuery: Keyloggers that capture user inputs.

These tools, alongside other utilities like RDPScanner for CLI and GUI, showcase Kimsuky’s strategic use of loaders and infection mechanisms to ensure continuous access and data exfiltration.

The infrastructure analysis revealed that the attackers predominantly used kr domains for their Command and Control (C2) operations.

For instance, the URLs http[:]//star7[.]kro[.]kr/login/help/show[.]php?_Dom=991 and http[:]//www[.]sign[.]in[.]mogovernts[.]kro[.]kr/rebin/include[.]php?_sys=7 were part of their communication channels, highlighting a sophisticated setup to manage the rerouting of traffic and potentially evade initial detection.

This campaign underscores the ongoing threat posed by state-sponsored actors like Kimsuky, who continue to refine their tactics and exploit known vulnerabilities to gain unauthorized access, illustrating the importance of timely patching and robust cybersecurity practices to thwart such advanced persistent threats.

Indicators of Compromise (IOCs)

Here are some of the IOCs associated with this campaign:

MD5URL/FQDN
1177fecd07e3ad608c745c81225e4544http[:]//star7[.]kro[.]kr/login/help/show[.]php?_Dom=991
14caab369a364f4dd5f58a7bbca34da6http[:]//star7[.]kro[.]kr/login/img/show[.]php?uDt=177
184a4f3f00ca40d10790270a20019bb4http[:]//www[.]sign[.]in[.]mogovernts[.]kro[.]kr/rebin/include[.]php?_sys=7
30bcac6815ba2375bef3daf22ff28698access-apollo-page[.]r-e[.]kr
46cd19c3dac997bfa1a90028a28b5045access-apollo-star7[.]kro[.]kr

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score of…

10 hours ago

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux, and…

10 hours ago

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security Features…

10 hours ago

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed in…

10 hours ago

Radware Cloud Web App Firewall Flaw Allows Attackers to Bypass Security Filters

Security researchers have uncovered two critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that…

10 hours ago

ESET Reveals How to Spot Fake Calls Demanding Payment for ‘Missed Jury Duty’

ESET, a leading cybersecurity firm, has shed light on one particularly insidious scheme: fake calls…

11 hours ago