On August 19
On August 19
In this blog, we share details on the North Korean threat actor Citrine Sleet
and the observed tactics, techniques, and procedures (TTPs) used to exploit
CVE-2024-7971, deploy the FudModule rootkit, and compromise systems. We
further provide recommended mitigations, detection details, hunting
guidance, and indicators of compromise (IOCs) to help defenders identify,
respond to, and improve defenses against these attacks.
SLEET ACTORS
The United States government has assessed that North Korean actors, like
Citrine Sleet, will likely continue targeting vulnerabilities of cryptocurrency
technology firms, gaming companies, and exchanges to generate and
launder funds to support the North Korean regime. One of the organizations
targeted by the CVE-2024-7971 exploitation was also previously targeted by
Sapphire Sleet.
Exploiting CVE-2024-7971
The observed zero-day exploit attack by Citrine Sleet used the typical stages
seen in browser exploit chains. First, the targets were directed to the Citrine
Sleet-controlled exploit domain voyagorclub[.]space. While we cannot
confirm at this time how the targets were directed, social engineering is a
common tactic used by Citrine Sleet. Once a target connected to the domain,
the zero-day RCE exploit for CVE-2024-7971 was served.
After the RCE exploit achieved code execution in the sandboxed Chromium
renderer process, shellcode containing a Windows sandbox escape exploit
and the FudModule rootkit was downloaded, and then loaded into memory.
The sandbox escape exploited CVE-2024-38106, a vulnerability in the
Windows kernel that Microsoft fixed on August 13, 2024, before Microsoft
discovered this North Korean threat actor activity. CVE-2024-38106 was
reported to Microsoft Security Response Center (MSRC) as being exploited;
however, our investigations so far have not suggested any link between the
reported CVE-2024-38106 exploit activity and this Citrine Sleet exploit
activity, beyond exploiting the same vulnerability. This may suggest a “bug
collision,” where the same vulnerability is independently discovered by
separate threat actors, or knowledge of the vulnerability was shared by one
vulnerability researcher to multiple actors.
Once the sandbox escape exploit was successful, the main FudModule rootkit
ran in memory. This rootkit employs direct kernel object manipulation
(DKOM) techniques to disrupt kernel security mechanisms, executes
exclusively from user mode, and performs kernel tampering through a kernel
read/write primitive. We did not observe any additional malware activity on
the target devices.
FudModule rootkit
Diamond Sleet has been observed using FudModule since October 2021. The
earliest variant of FudModule was reported publicly in September 2022
by ESET and AhnLAB researchers, when threat actors exploited known
vulnerable drivers to establish admin-to-kernel access in the technique
known as bring your own vulnerable driver (BYOVD). In February 2024, Avast
researchers published analysis on an updated FudModule variant that is
significantly more advanced and difficult to detect, since it exploits a zero-
day vulnerability in appid.sys, an AppLocker driver that is installed by default
into Windows (CVE-2024-21338).
Recommendations
The CVE-2024-7971 exploit chain relies on multiple components to
compromise a target, and this attack chain fails if any of these components
are blocked, including CVE-2024-38106. Microsoft released a security
update on August 13, 2024, for the CVE-2024-38106 vulnerability exploited
by Diamond Sleet, thus also blocking attempts to exploit the CVE-2024-7971
exploit chain on updated systems. Customers who have not implemented
these fixes yet are urged to do so as soon as possible for their organization’s
security.
Zero-day exploits necessitate not only keeping systems up to date, but also
security solutions that provide unified visibility across the cyberattack chain
to detect and block post-compromise attacker tools and malicious activity
following exploitation. Microsoft recommends the following mitigations to
reduce the impact of this threat.
Detection details
Microsoft Defender for Endpoint
The following Microsoft Defender for Endpoint alert might also indicate threat
activity related to this threat. Note, however, that this alert can also be
triggered by unrelated threat activity.
CVE-2024-7971
CVE-2024-38106
Hunting queries
Microsoft Defender XDR
Microsoft Defender XDR customers can run the following query to find
related activity in their networks:
Microsoft Defender XDR customers may query for devices that may have
interacted with Citrine Sleet domains related to this activity. Note that
Microsoft Defender for Endpoint customers may surface related events with
the alert title “Emerging threat activity group Citrine Sleet detected”.
Microsoft Sentinel
DeviceTvmSoftwareVulnerabilities
| where CveId has_any ("CVE-2024-7971","CVE-2024-38106","CVE-2024-38193","CVE-2024-21338")
| project DeviceId,DeviceName,OSPlatform,OSVersion,SoftwareVendor,SoftwareName,SoftwareVer
CveId,VulnerabilitySeverityLevel
| join kind=inner ( DeviceTvmSoftwareVulnerabilitiesKB | project CveId,
CvssScore,IsExploitAvailable,VulnerabilitySeverityLevel,PublishedDate,VulnerabilityDescrip
| project DeviceId,DeviceName,OSPlatform,OSVersion,SoftwareVendor,SoftwareName,SoftwareVer
CveId,VulnerabilitySeverityLevel,CvssScore,IsExploitAvailable,PublishedDate,VulnerabilityD
Indicators of compromise
During the attacks, Microsoft observed the following IOCs:
voyagorclub[.]space
weinsteinfrog[.]com
References
https://nvd.nist.gov/vuln/detail/CVE-2024-7971
https://chromereleases.googleblog.com/2024/08/stable-channel-
update-for-desktop_21.html
https://nvd.nist.gov/vuln/detail/CVE-2024-4947
https://nvd.nist.gov/vuln/detail/CVE-2024-5274
https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-
rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/
https://www.virusbulletin.com/uploads/pdf/conference/vb2022/
papers/VB2022-Lazarus-and-BYOVD-evil-to-the-Windows-core.pdf
https://asec.ahnlab.com/wp-content/uploads/2022/09/Analysis-Report-
on-Lazarus-Groups-Rootkit-Attack-Using-BYOVD_Sep-22-2022.pdf
https://decoded.avast.io/luiginocamastra/from-byovd-to-a-0-day-
unveiling-advanced-exploits-in-cyber-recruiting-scams/
https://www.gendigital.com/blog/news/innovation/protecting-windows-
users
https://www.google.com/chrome/update/
https://chromereleases.googleblog.com/2024/08/stable-channel-
update-for-desktop_21.html
Learn more
Read our blogs on threat actors, including Sleet actors. For the latest security
research from the Microsoft Threat Intelligence community, check out the
Microsoft Threat Intelligence Blog: https://aka.ms/threatintelblog.