Detecting new culprits attacking Windows 10
According to Kaspersky, the attacks coordinated by PuzzleMaker were first discovered in mid-April when the first victims' networks were compromised.
The zero-day exploit chain used a remote code execution vulnerability in Google Chrome's V8 JavaScript engine to gain access to targeted systems.
Next, PuzzleMaker used custom-tuned privileged exploit enhancement to compromise the latest versions of Windows 10 by abusing an information disclosure vulnerability in the Windows kernel (CVE-2021-31955) and Windows NTFS privilege escalation bug (CVE-2021 -31956), both fixed in the June Tuseday Patch.
Attackers have abused the Windows Notification Facility (WNF) along with the CVE-2021-31956 vulnerability to execute system-privileged malware modules on compromised Windows 10 systems.
"When attackers use both Chrome and Windows exploits to gain a foothold in the targeted system, the stager module loads and executes a more sophisticated dropper malware from a remote server. The dropper then installs two executables disguised as legitimate Microsoft Windows operating system files.The second of these two executables is a remote shell module that can download and upload files. , create a process, sleep for a certain period of time and delete itself from the infected system', the researchers informed.
This is not the first Chrome zero-day exploit that has become popular in recent months.
Project Zero, Google's zero-day bug hunting team, has revealed a large-scale operation in which a group of hackers used 11 zero-day vulnerabilities to attack Windows, iOS and Android users within a year. .
The attacks took place in two separate campaigns, in February and October 2020, with at least dozens of websites hosting two exploit servers, each targeting iOS and Windows users. or Android.
Project Zero researchers collected a large amount of information from the mining servers used in the two campaigns, including:
- renderer exploits for four bugs in Chrome, one of which is still a zero-day bug at the time of discovery
- two sandbox escape exploits abuse three zero-day vulnerabilities in Windows
- "privilege escalation suite" includes publicly known exploits for n-day vulnerabilities for older Android versions
- a full exploit chain targeting Windows 10 has been fully patched with Google Chrome
- two partial chains targeting two different fully patched Android devices running Android 10 using Google Chrome and Samsung Browser
- several RCE exploits for iOS 11-13 and one privilege escalation exploit for iOS 13 (with exploits present on iOS 14.1)
Boris Larin, senior security researcher at the Global Research and Analysis Group (GReAT), said: 'Overall, towards the end of the year, we have seen several waves of high-threat threat activity. level is driven by zero-day exploits. It reminds us that zero-day vulnerabilities continue to be the most effective method of infecting targets."
You should read it
- Detects a vulnerability that threatens all Windows computers shipped from 2012 up to now
- Steps to fix PrintNightmare vulnerability on Windows 10
- Warning of dangerous Spring4Shell vulnerability, there are signs of scanning and exploiting
- Detecting zero-day vulnerability in the Dropbox 10 Windows app, users pay attention!
- There were 4,035 cyber attacks on Vietnam in the first 5 months of the year
- Critical Vulnerability Discovered in 3 WordPress Plugins, Affects 84,000 Websites
- Microsoft urgently patched zero-day vulnerability after 2 years of refusing to acknowledge it
- Metasploit - Tool to exploit vulnerabilities
May be interested
- 3 ways to turn off the Windows 10 firewall, steps to turn off the firewall on Windows 10windows firewall, also known as firewall, is responsible for ensuring the safety of your windows computer. it will filter and prevent malicious data streams from attacking the computer.
- WiFi can detect weapons at security checkpointswifi was able to see through the wall, so it was possible to think of using technology to see through objects.
- How to fix Android not connecting to Windows via ADBadb not working or detecting your device on windows? if android can't connect via android debug bridge (adb), fixing this error requires just 3 basic steps.
- Microsoft warned about malware attacking XPtim rains, trustworthy computing director of microsoft, has warned windows users that microsoft will no longer support windows xp operating system since april 8, 2014. t
- Some basic points about the mechanism of attacking SQL Injection and DDoSin most of our users, many people have heard of the concept of attacking and hijacking websites with the method of sql injection - sqli and (distributed) denial of service - ddos.
- Microsoft has a group of 'elite' hackers that specialize in attacking Windows to keep the operating system safetheir mission is to attack to find security holes on windows, report to microsoft to research and release patches before the crook takes advantage of them for bad purposes.
- Google AI application in detecting eye diseasesrecently, google has announced cooperation with aravind eye hospital (india) to deploy ai technology in detecting eye disease diseases.
- Detecting malware infection campaign hidden in fake Windows 11 installerinternational security researchers have just issued an urgent notice about a sophisticated malicious attack campaign targeting windows users worldwide.
- Warning: New extortion code GandCrab is attacking Vietnamese Internet usersyesterday afternoon (december 11), bkav issued a warning about a fifth generation variant of gandcrab extortion code that was attacking vietnamese internet users on a large scale.
- What is BitLocker? How to turn it on and off on Windows 10, 11encryption when sharing online has now been applied on computer hard drives to secure personal data with bitlocker software. in addition to securing personal information, you can also use bitlocker to prevent hackers from attacking and accessing your device. follow tipsmake's article below to know what bitlocker is.