Skip to content

APT38 Tactic PoC for Stealing 0days from security researchers

Notifications You must be signed in to change notification settings

ZeroMemoryEx/APT38-0day-Stealer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Lazarus-Tactic

Image Description
  • A program that automates the APT38 technique, which has been utilized to target cybersecurity researchers experts

  • Lazarus is a state-sponsored group affiliated with North Korea, has a well-documented track record of targeting cybersecurity researchers. Among their notable techniques, one stands out for its effectiveness in tricking numerous cybersecurity experts.

  • The attackers create multiple Twitter and other social media accounts to establish credibility. Through social engineering tactics, they manipulate security researchers into engaging in collaborative research using a Microsoft Visual Studio Project, the project contains a malicious code in the vcxproj file. Consequently, when the researcher attempts to build the project, the malicious code embedded within it is executed.

technical Details

This analysis is based on information shared by both Google Threat Analysis Group and a security researcher Joel Eriksson who documented their experience with this attack. Their tweet highlighted effective protection measures:

Initial Approach

  • Create believable security researcher personas on social platforms and Build trust through technical conversations
Image Description
  • Target actual security researchers through direct messages and Offer collaboration on "proof of concept" projects
Image Description

Delivery Mechanism

  • Send encrypted ZIP files containing Visual Studio projects and claim the projects demonstrate interesting vulnerabilities Mention encryption to appear security-conscious
Image Description

Use small file sizes (452.13KB) to seem like legitimate code projects

Execution Method

Hide malicious PowerShell commands within Visual Studio project files the powerShell commands execute with bypassed execution policy and hidden windows Include OS checks that verify:

  • Windows 10 is running (osversion.version.major -eq 10)
  • System is 64-bit (is64bitoperatingsystem)
  • A specific path exists (Test-Path x64\Debug\Browse.VC.db)

Key technique: Use rundll32 to load malicious code from a file disguised as a Visual Studio database file and call a specific exported function ENGINE_get_RAND with two parameters: A 16-character string that appears to be a key/identifier: 6bt7cJNGEb3Bx9yK A numeric value: 2907

Image Description

APT38-0day-Stealer technical Details

  • Upon execution within the Visual Studio projects directory, the program infects all vcxproj files by injecting custom code. This code is designed to execute when the individual attempts to build the project .
Image Description

Attack Scenario: Developer Environment Supply Chain Attack

An attacker sends a malicious Visual Studio project to a developer, the developer opens the project, appearing to be a legitimate code sample, Upon first build, the program infects ALL Visual Studio projects on the developer's system

The infected developer continues normal work, modifying and sharing projects with colleagues and each shared project carries the infection to new developer machines and when colleagues open and build these projects, their environments become infected the infection continues to spread across the development team

Impact

In a successful campaign, this will create a catastrophic compromise of the entire development ecosystem .

Image Description

DEMO

DEMO_.mp4

Credits