Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

FudModule (Trojan) – Malware

February 16, 2025
Reading Time: 3 mins read
in Malware
FudModule (Trojan) – Malware

FudModule

Type of Malware

Trojan

Country of Origin

North Korea

Targeted Countries

United States
South Korea
Japan
India
United Kingdom
Germany
Russia
Vietnam
Bangladesh
Australia
Singapore
Malaysia
Thailand
Philippines
Poland

Date of Initial Activity

2022

Addittional Names

LIGHTSHOW

Associated Groups

APT38

Motivation

Cyberwarfare
Data Theft

Attack Vectors

Software Vulnerabilities

Targeted Systems

Windows

Type of Information Stolen

Communication Data
Corporate Data
Cryptocurrencies
Financial Information
Login credentials
Medical Records
Personal Identifiable Information (PII)
System Information

Overview

The FudModule trojan is a sophisticated piece of malware that has gained notoriety for its ability to maintain stealth and gain deep-level access to compromised systems. Initially observed in use by the North Korean threat actor Diamond Sleet, FudModule has evolved over time into a highly effective tool for maintaining control over infected systems. It specifically targets Windows-based systems, operating at the kernel level to perform critical operations like kernel tampering and security mechanism bypassing. The rootkit operates primarily in memory, making it difficult to detect and remove, allowing threat actors to carry out long-term surveillance and control of their targets’ devices.

Targets

Arts, Entertainment, and Recreation Finance and Insurance Public Administration Information Utilities Health Care and Social Assistance Professional, Scientific, and Technical Services Manufacturing

How they operate

Initial Infection and Exploitation
FudModule’s attack begins when a victim is targeted through a series of exploits designed to take advantage of specific vulnerabilities in software. These vulnerabilities often include zero-day exploits, which are previously unknown flaws in widely used applications or system components. A notable example is CVE-2024-7971, a type confusion vulnerability found in the Chromium browser’s V8 JavaScript engine. Once the victim interacts with a maliciously crafted website or is tricked into running a weaponized application, the malware can exploit these vulnerabilities to gain remote code execution (RCE) within the victim’s system. After achieving RCE, FudModule deploys a payload that includes an array of malicious tools, the most critical being a vulnerability exploit targeting the Windows kernel. The kernel is the core component of an operating system responsible for managing hardware and system resources. By exploiting this kernel vulnerability, FudModule bypasses the security sandbox in the affected browser and gains privileged access to critical system resources, setting the stage for further actions.
Privilege Escalation and Kernel Manipulation
Once FudModule has gained initial execution on the system, it aims to escalate its privileges from low-level access to full administrative control. This is achieved by exploiting kernel vulnerabilities such as CVE-2024-38106, a Windows kernel bug that allows attackers to break out of system sandboxes and gain access to kernel-space functions. With this higher level of access, FudModule can manipulate system-level operations, bypass security controls, and execute its payloads with minimal detection. The malware uses techniques like Direct Kernel Object Manipulation (DKOM) to interact with the Windows kernel directly. DKOM enables FudModule to modify kernel objects in memory, such as processes, threads, and other critical data structures, without altering them on disk. This ability is crucial for the malware’s persistence, as it allows FudModule to evade detection by security software that typically scans file systems or registry keys for signs of malicious activity.
Evasion and Stealth Mechanisms
FudModule excels at avoiding detection, employing various stealth tactics to hide its presence within the infected system. One of the primary methods it uses is obfuscation. The malware hides its operations by executing directly from memory rather than writing files to disk, which makes it harder for traditional file-based security tools to detect. Moreover, it can disguise its actions by modifying system logs and activity records, ensuring that traces of its activity are erased or altered before they can be flagged by investigators. Additionally, FudModule operates in a manner that disables or evades traditional security software. This involves altering kernel-level processes to disable security checks or obscure the malware’s operation within the system’s runtime environment. These evasion techniques prevent antivirus software and endpoint protection tools from identifying the malware during regular system scans, allowing FudModule to continue its operations undetected for long periods. Data Exfiltration and Command-and-Control Communication FudModule also facilitates data exfiltration, allowing attackers to siphon sensitive information from the compromised system. With elevated access and control, FudModule can collect a wide range of data, from user credentials to encrypted files and system configurations. This data is often sent back to an attacker-controlled server via secure communication channels, ensuring that the data exfiltration process remains undetected. The malware can establish an encrypted, persistent connection to a command-and-control (C2) server, allowing attackers to issue further commands and receive updates from the compromised machine. This C2 communication can be disguised to look like normal, encrypted web traffic, making it difficult for network-based security tools to spot the data being exfiltrated.  
References:
  • North Korean threat actor Citrine Sleet exploiting Chromium zero-day
Tags: APT38AustraliaBangladeshFudModuleGermanyIndiaJapanJavascriptLIGHTSHOWMalaysiaMalwareNorth KoreaPhilippinesPolandRussiaSingaporeSouth KoreaThailandTrojansUnited KingdomUnited StatesVietnamVulnerabilitiesWindows
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

AMOS Stealer Hits macOS Via Fake CAPTCHA

Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

FBI Warns Hedera NFT Airdrop Crypto Scam

New Chaos RAT Variant Hits Windows and Linux

UNC6040 Vishing Group Target Salesforce Data

Subscribe to our newsletter

    Latest Incidents

    German Dog Rescue IG Hacked For Ransom

    Hack Attempt Hits German Police Phone System

    InfoJobs Spain Hit By Credential Stuffing

    KiranaPro Startup Hacked All Data Wiped

    Nervos Bridge Paused After $3.9 Million Hack

    Ukraine GUR Claims Tupolev Data Theft Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial