Waiting To Replace That Old Software? Consider Making It A Priority

A large-scale cyberattack by the North Korean hacking group ScarCruft (also known as APT37 or RedEyes) occurred in May 2024. They exploited a zero-day vulnerability in Internet Explorer, tracked as CVE-2024-38178, to infect targets with the RokRAT malware. Despite Internet Explorer being officially retired, its components still exist in Windows and third-party software, making it a target for hackers.

ScarCruft compromised a South Korean online advertising agency's server to push malicious "Toast ads" on free software used by many South Koreans. These ads included a malicious iframe that triggered remote code execution via the Internet Explorer flaw. The RokRAT malware exfiltrated files, performed keylogging, monitored clipboard changes, and captured screenshots.

Microsoft patched the vulnerability in August 2024.

Source: https://www.bleepingcomputer.com/news/security/malicious-ads-exploited-internet-explorer-zero-day-to-drop-malware/

Commentary

The North Koreans targeted South Koreans, but the article provides important lessons to all organizations, no matter location, about using software that is outdated or unsupported. 

  • Unsupported software no longer receives security updates, making it vulnerable to new exploits and attacks. In this case, the Internet Explorer vulnerability allowed hackers to execute remote code and spread malware.
  • Operational Inefficiencies: Unsupported software may not be compatible with newer systems and applications, leading to operational inefficiencies, increased maintenance costs and security lapses
  • As seen in the above source, outdated software can be a gateway for cyber-espionage and data breaches, compromising sensitive information.

The final takeaway is that organizations should prioritize regular software updates and consider transitioning to supported and secure alternatives to outdated software to mitigate security risks.

Finally, your opinion is important to us. Please complete the opinion survey:

Product

Articles

Preventing Fraudulent Collaboration Between Employees And Commercial Customers

A real estate developer is sentenced to 13 years in prison. His crime? Bringing down a financial institution with fraudulent loans. We examine.

Microsoft Support Scam Uses Proven Social Engineering Technique Against Organizations

The Black Basta ransomware group is targeting organizations with ransomware by offering to fix a problem they created. We examine.

Time For Healthcare Organizations To Rethink Storing Social Security Numbers?

A radiology group pays $1.85M for a breach. Social security numbers were stolen. We provide reasons it is time for healthcare to rethink collecting and storing full SSNs.

The Corporate Transparency Act: Spring 2025 Update

The Corporate Transparency Act, aimed at fighting financial crimes, became effective on January 01, 2024. Learn about its current enforcement status.

Do You Think Remote Work Erodes Social Skills? You Make The Call

A survey reveals remote workers' skills are eroding. Is that what you have experienced or think? You make the call.