09/03/2024
North Korean Hackers Exploited a Google Chrome Vulnerability
TL:DR
North Korean hackers exploited a Google Chrome vulnerability to gain high-level access to systems, then deployed a sneaky rootkit called FudModule. They're targeting the cryptocurrency sector for money, using fake crypto websites and malicious software. Microsoft identified the hackers as Citrine Sleet, part of a bigger North Korean cybercrime network. Despite Google patching the vulnerability, the damage was already done, and these hackers continue to be a major threat, sharing tools and tactics across different groups.
North Korean Hackers Exploited a Google Chrome Vulnerability
In the latest episode of "How to Hack the Planet," North Korean cyber-gurus just couldn't resist playing with a shiny new toy—a Google Chrome zero-day (CVE-2024-7971). They waltzed right in, grabbed SYSTEM privileges using a Windows Kernel exploit, and deployed their new favorite rootkit, FudModule, like it was their version of antivirus software.
Microsoft, never one to miss a plot twist, confidently pointed the finger at Citrine Sleet—because nothing says "we're onto you" like a code name cooler than your hacker group's real one. For those keeping score at home, these guys are also known as AppleJeus, Labyrinth Chollima, UNC4736, or just "those North Korean dudes after your Bitcoin."
Their latest heist involved targeting the cryptocurrency sector, where they probably thought, "Why work for money when you can just hack it?" Citrine Sleet’s roots run deep, all the way to Bureau 121, North Korea's Reconnaissance General Bureau—because every villain needs a shady headquarters.
These hackers aren’t your average cybercriminals. They set up fake cryptocurrency websites to lure in unsuspecting victims with promises of fortune—only to hit them with weaponized wallets or job applications that, surprise, lead to malware instead of a payday.
Remember that time they hacked the 3CX video conferencing software? Yeah, that was them too. They’ve got quite the portfolio, from trojanizing stock trading software to compromising legit websites like Trading Technologies to push their malware.
Google's Threat Analysis Group (TAG) linked AppleJeus to yet another scheme, because apparently, one shady operation just isn't enough. The U.S. government has been warning about these crypto-obsessed hackers for years—guess some folks never learn.
So, what happened this time? Google patched the CVE-2024-7971 vulnerability last week, but not before these North Korean hackers had their fun. They exploited it to gain remote code ex*****on in Chrome's V8 JavaScript engine, like they were just playing a game of online chess. After breaking free from the sandbox, they used a Windows Kernel exploit (CVE-2024-38106, for those who care about the fine print) to gain SYSTEM privileges, like leveling up in the worst video game ever.
Then came the grand finale: downloading and loading the FudModule rootkit into memory, bypassing security mechanisms like they were hopping a fence. This rootkit, discovered in October 2022, has been their go-to tool for kernel tampering and DKOM (Direct Kernel Object Manipulation), because who needs security when you can just rewrite the rules?
And in case you missed it, another North Korean crew, Diamond Sleet, has also been in on the action, sharing tools and attack infrastructure with Citrine Sleet like they’re swapping recipes.
So, while the rest of us are busy patching our systems and trying not to panic, these hackers are out there, living their best lives—one zero-day at a time.