This website uses cookies

Our website, platform and/or any sub domains use cookies to understand how you use our services, and to improve both your experience and our marketing relevance.

🔊 Web Growth Summit is here! Learn from industry experts on July 17-18, 2024. REGISTER NOW→

South Korean ERP Vendor Hacked to Spread Xctdoor Malware

Updated on July 3, 2024

2 Min Read


An unnamed South Korean enterprise resource planning (ERP) vendor’s product update server was compromised to deliver a Go-based backdoor dubbed Xctdoor.

The AhnLab Security Intelligence Center (ASEC), which identified the attack in May 2024, did not attribute it to a known threat actor but noted similarities with Andariel, a sub-cluster within the notorious Lazarus Group.

via GIPHY

This attack mirrors previous methods used by the North Korean adversary, who previously distributed malware like HotCroissant (identical to Rifdoor) in 2017 by inserting a malicious routine into a software update program.

In the recent incident analyzed by ASEC, the same executable was tampered with to execute a DLL file from a specific path using the regsvr32.exe process, instead of launching a downloader. The DLL file, Xctdoor, can steal system information, including keystrokes, screenshots, and clipboard content, and execute commands issued by the threat actor.

Xctdoor communicates with the command-and-control (C2) server using the HTTP protocol, while the packet encryption employs the Mersenne Twister (MT19937) algorithm and the Base64 algorithm,” ASEC noted.

Additionally, the attack used XcLoader, an injector malware responsible for injecting Xctdoor into legitimate processes like explorer.exe. ASEC detected instances where poorly secured web servers were compromised to install XcLoader since at least March 2024.

Meanwhile, another North Korea-linked threat actor, Kimusky, has been using a previously undocumented backdoor called HappyDoor since July 2021. Attack chains distributing this malware often start with spear-phishing emails that disseminate a compressed file containing an obfuscated JavaScript or dropper, which, when executed, creates and runs HappyDoor alongside a decoy file.

HappyDoor, executed via regsvr32.exe, can communicate with a remote server over HTTP, steal information, download/upload files, and update or terminate itself.

This development follows a “massive” malware distribution campaign by the Konni cyber espionage group targeting South Korea with phishing lures impersonating the national tax service to deliver malware capable of stealing sensitive information, according to security researcher Idan Tarab.

These incidents highlight the ongoing threat posed by sophisticated cyber adversaries and the importance of robust cybersecurity measures to protect critical infrastructure.

Share your opinion in the comment section. COMMENT NOW

Share This Article

Start Growing with Cloudways Today.

Our Clients Love us because we never compromise on these

Abdul Rehman

Abdul is a tech-savvy, coffee-fueled, and creatively driven marketer who loves keeping up with the latest software updates and tech gadgets. He's also a skilled technical writer who can explain complex concepts simply for a broad audience. Abdul enjoys sharing his knowledge of the Cloud industry through user manuals, documentation, and blog posts.

×

Thankyou for Subscribing Us!

×

Webinar: How to Get 100% Scores on Core Web Vitals

Join Joe Williams & Aleksandar Savkovic on 29th of March, 2021.

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Want to Experience the Cloudways Platform in Its Full Glory?

Take a FREE guided tour of Cloudways and see for yourself how easily you can manage your server & apps on the leading cloud-hosting platform.

Start my tour

CYBER WEEK SAVINGS

  • 0

    Days

  • 0

    Hours

  • 0

    Mints

  • 0

    Sec

GET OFFER

For 4 Months &
40 Free Migrations

For 4 Months &
40 Free Migrations

Upgrade Now