The Purple Fox EK continues to be improved by its authors that implemented two new exploits for Microsoft critical- and high-severity Microsoft vulnerabilities.
The Purple Fox EK appears to have been built to replace the notorious RIG exploit kit (EK) in the distribution of the Purple Fox Trojan. The authors of the Trojan also developed their own EK for distributing it to maximize their profits. The authors of the Purple Fox malware have stopped using the RIG EK and moved to an in-house EK, this confirms the goal to cut the cost.
The new version of the exploit kit includes the code for the exploitation of the CVE-2020-0674 and CVE-2019-1458.
In January, Microsoft has published a security advisory (ADV200001) that includes mitigations for the CVE-2020-0674 zero-day remote code execution (RCE) vulnerability affecting Internet Explorer. At the time, the tech giant confirmed that the CVE-2020-0674 zero-day vulnerability has been actively exploited in the wild.
An attacker could exploit the flaw to can gain the same user permissions as the user logged into the compromised Windows device. If the user is logged on with administrative permissions, the attacker can exploit the flaw to take full control of the system.
The CVE-2020-0674 flaw could be triggered by tricking victims into visiting a website hosting a specially crafted content designed to exploit the issue through Internet Explorer.
The CVE-2019-1458 Windows zero-day was addressed by Microsoft’s December 2019 Patch Tuesday, it was exploited in North Korea-linked attacks. The vulnerability could be exploited to execute arbitrary code in kernel mode.
The CVE-2019-1458 vulnerability is a privilege escalation issue related to how the Win32k component handles objects in memory.
Microsoft addresses this vulnerability by correcting how Win32k handles objects in memory.
The vulnerability was reported by Kaspersky, experts at the security firm confirmed that the CVE-2019-1458 flaw has been exploited in a campaign called Operation WizardOpium.
Experts from Proofpoint pointed out that the Purple Fox malware previously used exploits targeting older Microsoft flaws, including the CVE-2018-8120 and CVE-2015-1701 issues.
“In this latest revision to the Purple Fox EK, we see the authors adding attacks against both CVE-2020-0674 and CVE-2019-1458, two vulnerabilities that came out at the end of 2019 and early 2020.” reads the analysis published by ProofPoint.
The experts uncovered a malvertising campaign at the end of June, threat actors were using the Purple Fox EK to trigger the CVE-2020-0674 on Windows 10 via Internet Explorer 11.
The CVE-2020-0674 exploit targets Internet Explorer’s usage of jscript.dll, a Windows library. Upon starting the attack, the malicious script attempts to leak an address from the RegExp implementation within jscript.dll, then use the address to search for PE header of jscript.dll, and then uses it to locate an import descriptor for kernel32.dll.targets Internet Explorer’s usage of jscript.dll, the JavaScript must be run using compatibility mode (using “JScript.Compact” or “JScript.Encode” in the HTML script tag). At the start of the exploit process for CVE-2020-0674,
The descriptor for kernel32.dll contains the process and memory manipulation functions required for the EK to load the actual shellcode.
“In particular, the function GetModuleHandleA is used to obtain the running module handle,” continues the experts. “This handle is used along with GetProcAddress to locate VirtualProtect, which is in turn used to enable ‘read, write, execute’ (RWX) permissions on the shellcode. Finally, the shellcode is triggered by calling an overwritten implementation of RegExp::test.”
The shellcode is used to locate WinExec to create a new process by running the command “mshta <payload URL> which begins the actual execution of the malware.
Experts highlight the role of the Exploit kits in the threat landscape, they continue to be part of some attack chains even if they are not as prevalent as they were a few years ago.
“One thing that hasn’t changed regarding exploit kits is the way in which exploit-kit authors regularly update to include new attacks against newly discovered vulnerabilities,” researchers conclude. “In this latest revision to the Purple Fox EK, we see the authors adding attacks against both CVE-2020-0674 and CVE-2019-1458, two vulnerabilities that came out at the end of 2019 and early 2020. This tells us that the authors of Purple Fox are staying up to date on viable exploitable vulnerabilities and updating when they become available. It’s reasonable to expect that they will continue to update as new vulnerabilities are discovered.”
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Purple Fox EK)
[adrotate banner=”5″]
[adrotate banner=”13″]
Meta stopped three covert operations from Iran, China, and Romania using fake accounts to spread…
The U.S. sanctioned Funnull Technology and Liu Lizhi for aiding romance scams that caused major…
ConnectWise detected suspicious activity linked to a nation-state actor, impacting a small number of its…
Victoria’s Secret took its website offline after a cyberattack, with experts warning of rising threats…
Google says China-linked group APT41 controlled malware via Google Calendar to target governments through a…
GreyNoise researchers warn of a new AyySSHush botnet compromised over 9,000 ASUS routers, adding a…
This website uses cookies.