The operators behind the DarkGate malware have been taking advantage of a recently patched flaw in Windows SmartScreen through a phishing scheme.
This campaign involves circulating counterfeit Microsoft software installers to spread the malicious code.
Researchers from Trend Micro, along with others, uncovered a vulnerability earlier this year, known as CVE-2024-21412, which allowed attackers to bypass security measures in Internet Shortcut Files.
Microsoft addressed this issue in its February Patch Tuesday updates, but not before threat actors like Water Hydra and DarkGate seized the opportunity to exploit it.
Trend Micro's Zero Day Initiative reported that DarkGate also utilized this flaw in a mid-January attack, enticing users with PDFs containing Google DoubleClick Digital Marketing redirects, ultimately leading to compromised websites hosting the malware-laden installers.
According to Trend Micro researchers Peter Girnus, Aliakbar Zahravi, and Simon Zuckerbraun, the attackers manipulated Google-related domains using open redirects in conjunction with CVE-2024-21412 to circumvent Microsoft Defender SmartScreen protections, facilitating malware infections.
They emphasized the effectiveness of combining fake software installers with open redirects in propagating infections.
DarkGate, described as a remote-access Trojan, has been advertised on Russian-language cybercrime forums since at least 2018 and is considered one of the most sophisticated and active malware strains.
It offers various functionalities, including process injection, information theft, shell command execution, and keylogging, while employing multiple evasion techniques.
The DarkGate campaign observed by Trend Micro leverages Google Open Redirects, exploiting a previously patched SmartScreen vulnerability, CVE-2023-36025, affecting all supported Windows versions.
By utilizing open redirects in Google DDM technologies, threat actors can execute malicious code when combined with security bypasses.
To defend against DarkGate's exploitation of CVE-2024-21412, Windows system administrators are advised to apply Microsoft's patch promptly.
Organizations should prioritize employee training to raise awareness about the risks of installing software from untrusted sources.
Continuous monitoring of the cyber environment, including identifying vulnerabilities and potential attack vectors, is crucial for effective cybersecurity defense.
In conclusion, proactive measures are necessary for both businesses and individuals to safeguard their systems against evolving threats like DarkGate and similar malware campaigns.
This Cyber News was published on www.cysecurity.news. Publication date: Sat, 16 Mar 2024 18:43:05 +0000