North Korea-linked Lazarus APT Exploits Microsoft Zero-Day CVE-2024-38193

August 19, 2024

Microsoft has rectified a zero-day vulnerability identified as CVE-2024-38193 (with a CVSS score of 7.8), which has been actively exploited by the Lazarus APT group linked to North Korea. This vulnerability is a privilege escalation issue located in the Windows Ancillary Function Driver (AFD.sys) for WinSock. Microsoft released security updates in August 2024 to address this flaw, also warning that it was being exploited in attacks in the wild. The vulnerability allows an attacker to gain SYSTEM privileges. It was reported by Luigino Camastra and Milánek from Gen Digital.

“Gen Threat Labs recently uncovered and reported a major security flaw known as a zero-day vulnerability (CVE-2024-38193), which Microsoft has now fixed. This repair is important because it addresses a security issue that was being used by the Lazarus APT group, a North Korean hacker group known for targeting specific professionals.” Gen Digital reported in a post.

In June, Gen Digital researchers found that the Lazarus group was exploiting a zero-day vulnerability in the AFD.sys driver to gain unauthorized access to sensitive system areas. The group used a specific type of malware called Fudmodule to evade detection. The researchers noted that the vulnerability allowed attackers to bypass normal security restrictions and access sensitive system areas that are typically unreachable by most users and administrators. This type of attack is both sophisticated and resourceful, potentially costing several hundred thousand dollars on the black market.

The report further highlighted that the attacks targeted individuals in sensitive fields such as cryptocurrency engineering or aerospace, with the aim of gaining access to their employer’s networks and stealing cryptocurrencies to fund the attackers' operations.

In February 2024, Avast discovered a zero-day vulnerability in the AppLocker driver (appid.sys) being exploited in the wild. Microsoft promptly fixed this flaw, now known as CVE-2024-21338, in the February Patch Tuesday update. The Lazarus group exploited this zero-day to gain kernel-level access and disable security software. In previous attacks, threat actors achieved the same goal by using louder BYOVD (Bring Your Own Vulnerable Driver) techniques to cross the admin-to-kernel boundary. Lazarus exploited the vulnerability CVE-2024-21338 to perform direct kernel object manipulation with an updated version of their FudModule rootkit.

The researchers concluded that with their valuable admin-to-kernel zero-day exposed, Lazarus’s ability to bypass security has been significantly hampered. They must now decide between finding a new critical exploit or reverting to their older, less potent BYOVD tactics.

Related News

Latest News

Like what you see?

Get a digest of headlines, vulnerabilities, risk context, and more delivered to your inbox.

Subscribe Below

By submitting this form, you’re giving us permission to email you. You may unsubscribe at any time.

Accelerate Security Teams

Continuously identify and prioritize the risks that are most critical in your environment, and validate that your remediation efforts are reducing risk. An always-on single source-of-truth of your assets, services, and vulnerabilities.