Windows zero-day leveraged for RokRAT malware delivery

Threat actors leveraged the flaw to target a toast advertisement program with an unsupported Internet Explorer module, which when installed would trigger a type confusion error and several malicious actions, including the deployment of the RokRAT trojan, a joint analysis from AhnLab Security Intelligence Center and South Korea’s National Cyber Security Center showed. Aside from having file enumeration and arbitrary process termination capabilities, RokRAT’s latest iteration has also enabled remote command execution and data exfiltration from various browsers and apps.

Source: SC Magazine

 


Date:

Categorie(s):