Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

ScarCruft Exploits Zero-Day to Spread RokRAT

October 17, 2024
Reading Time: 2 mins read
in Alerts
ScarCruft Exploits Zero-Day to Spread RokRAT

The North Korean threat actor known as ScarCruft has recently exploited a Windows zero-day vulnerability, CVE-2024-38178, to distribute the RokRAT malware. This particular security flaw, rated with a CVSS score of 7.5, is a memory corruption issue in the Windows Scripting Engine that allows for remote code execution when using Microsoft Edge in Internet Explorer Mode. Although Microsoft patched this vulnerability as part of its August 2024 updates, ScarCruft had already begun targeting users through malicious advertisements prior to the patch, taking advantage of this significant security weakness.

The attack, referred to as “Operation Code on Toast,” was identified by the AhnLab Security Intelligence Center (ASEC) and the National Cyber Security Center (NCSC) of South Korea. In this operation, ScarCruft compromised the server of a domestic advertising agency, injecting malicious exploit code into “toast” ads—pop-up notifications that typically appear in the lower-right corner of users’ screens. These ads, often bundled with various free software, served as a delivery mechanism for the exploit. When users interacted with these ads, the vulnerability was triggered, allowing the attackers to gain remote access to the infected systems.

Once inside, the RokRAT malware facilitated a range of malicious activities for ScarCruft, including file enumeration, command execution, and data exfiltration from popular applications such as KakaoTalk and WeChat. Notably, RokRAT utilizes legitimate cloud services like Dropbox, Google Cloud, and Yandex Cloud as its command-and-control infrastructure. This tactic allows the malware to blend in with regular network traffic, making it more challenging for security teams to detect its malicious activities. By leveraging such cloud services, ScarCruft enhances the stealth of its operations while executing commands from a remote server.

This incident underscores a broader trend of ScarCruft exploiting vulnerabilities in legacy browser components to conduct cyberattacks. In recent years, the group has been attributed with leveraging other critical security flaws, such as CVE-2020-1380 and CVE-2022-41128, to deliver follow-on malware. As the technological capabilities of North Korean hacking organizations continue to advance, cybersecurity experts emphasize the importance of maintaining updated operating systems and software. To protect against these evolving threats, users are urged to regularly install security patches and adopt robust cybersecurity practices to mitigate risks associated with such vulnerabilities. By being proactive in their security measures, organizations can better safeguard their systems from sophisticated attacks like those orchestrated by ScarCruft.

Reference:
  • ScarCruft Exploits Windows Zero-Day Vulnerability to Spread RokRAT Malware
Tags: Cyber AlertsCyber Alerts 2024Cyber threatsKakaoTalkMalwareNorth KoreaOctober 2024RokRatScarCruftVulnerabilitiesWeChatWindowsZero-Day
ADVERTISEMENT

Related Posts

New Godfather Trojan Hijacks Banking Apps

Winos 4.0 Malware Hits Taiwan Via Tax Phish

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Godfather Trojan Hijacks Banking Apps

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Amatera Stealer Delivered By ClearFake

June 20, 2025
Fake Invoices Deliver Sorillus RAT In Europe

Fake Minecraft Mods On GitHub Spread Malware

June 19, 2025
Russian Phishing Scam Bypasses Google 2FA

Russian Phishing Scam Bypasses Google 2FA

June 19, 2025
Fake Invoices Deliver Sorillus RAT In Europe

Fake Invoices Deliver Sorillus RAT In Europe

June 19, 2025

Latest Alerts

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Amatera Stealer Delivered By ClearFake

New Godfather Trojan Hijacks Banking Apps

Fake Minecraft Mods On GitHub Spread Malware

Fake Invoices Deliver Sorillus RAT In Europe

Russian Phishing Scam Bypasses Google 2FA

Subscribe to our newsletter

    Latest Incidents

    Massive Leak Exposes 16 Billion Credentials

    Tonga Health System Down After Ransomware

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    Hacker Mints $27M From Meta Pool Gets 132K

    UBS and Pictet Hit By Vendor Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial