South Korean Users The Target Of Kimsuky's Troll Stealer And GoBear Backdoor

Related Vulnerabilities: CVE-2024-21412   cve-2024-21412  

Properties
Threat Severity

Medium

Description

In late December 2023, researchers detected a campaign by the Water Hydra group using similar tools, tactics, and procedures (TTPs) involving internet shortcuts (.URL) and Web-based Distributed Authoring and Versioning (WebDAV). Exploiting CVE-2024-21412, they bypassed Microsoft Defender SmartScreen to distribute DarkMe malware. Water Hydra launched spearphishing attacks on forex and stock trading forums via social engineering on Telegram channels. They posted messages offering trading advice or fake financial tools with URLs leading to trojan horse stock charts on compromised Russian trading sites. These links redirected to an HTML landing page with a disguised JPEG link, which pointed to a WebDAV share. DarkMe, a VisualBasic-based trojan, evolved from a downloader to a spyware-capable stub-type trojan with communication through a public WinSock32 module, with multiple versions released since September 2021. The Trellix Threat Intelligence Group (TIG) gathers and analyzes information from multiple open and closed sources before disseminating intelligence reports. This campaign was researched by Trend Micro and shared publicly https://www.trendmicro.com/en_us/research/24/b/cve202421412-water-hydra-targets-traders-with-windows-defender-s.html

Knowledge Base
  • Available Soon
Global Prevalence
Low
High
Observed Countries11
  • United States8.02 devices found impacted per 1M devices
  • Turkey117.3 devices found impacted per 1M devices
  • Italy73.58 devices found impacted per 1M devices
  • Germany7.81 devices found impacted per 1M devices
  • United Arab Emirates136.79 devices found impacted per 1M devices
  • Malaysia73.39 devices found impacted per 1M devices
  • Israel32.28 devices found impacted per 1M devices
  • India7.05 devices found impacted per 1M devices
  • Spain4.71 devices found impacted per 1M devices
  • Philippines17.01 devices found impacted per 1M devices
  • Taiwan15.03 devices found impacted per 1M devices
Observed Sectors8
  • Unknown Sectors
    81.54 devices found impacted per 1M devices
  • Wholesale
    2.35 devices found impacted per 1M devices
  • Banking/Financial/Wealth Management
    18.72 devices found impacted per 1M devices
  • Government
    2.44 devices found impacted per 1M devices
  • Automotive
    2.4 devices found impacted per 1M devices
  • Outsourcing & Hosting
    4.71 devices found impacted per 1M devices
  • Technology/IT
    1.09 devices found impacted per 1M devices
  • Telecom
    9.83 devices found impacted per 1M devices
Compare Detections

Detection rate is the number of artifact detections reported by McAfee global sensors for this threat over 8 days.

Threat Prevalence - Past 8 days

The detection rate bubbles are sized based on the values below:

1-20 20-50 50-100 100+
Feb 16, 2024
Feb 17, 2024
Feb 18, 2024
Feb 19, 2024
Feb 20, 2024
Feb 21, 2024
Feb 22, 2024
Feb 23, 2024
Sector
Country
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0