North Korean Hackers Unleash Chaos: Chrome Zero-Day Exploited to Deploy Stealthy Rootkit!

North Korean hackers Chrome zero-day exploit targets cryptocurrency.
Spread the love
  • North Korean hackers exploit a Chrome zero-day (CVE-2024-7971) to deploy the FudModule rootkit, gaining SYSTEM privileges via a Windows Kernel exploit.
  • Microsoft attributes the attacks to the threat group Citrine Sleet, which targets the cryptocurrency sector for financial gain.
  • The hackers use fake cryptocurrency trading platforms to lure victims, often employing malicious job applications and weaponized wallets.
  • Google recently patched the zero-day vulnerability, which allowed attackers to execute remote code in the Chromium renderer and escape the sandbox.
  • The FudModule rootkit has been linked to other North Korean hacking groups, highlighting ongoing threats to financial institutions and cryptocurrency organizations.
Summarized Article:

https://www.bleepingcomputer.com/news/security/north-korean-hackers-exploit-chrome-zero-day-to-deploy-rootkit/



Related Video
Published on: March 26, 2022 Description: Source: https://www.spreaker.com/user/mediapartnersweb/north-korean-hackers-exploited-chrome-ze North Korean Hackers ...
North Korean Hackers Exploited Chrome Zero-Day to Target Fintech, IT, and Media Firms
Play


Related Wikipedia Articles

Topics: No response

Response
Response may refer to: Call and response (music), musical structure Reaction (disambiguation) Request–response Output or response, the result of telecommunications input Response (liturgy), a line answering a versicle Response (music) or antiphon, a response to a psalm or other part of a religious service Response, a phase in emergency management...
Read more: Response

Author:

Leave a Reply

Your email address will not be published. Required fields are marked *