Cyber Threat Report: 'CVE-2024-21412: DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign'

Report Author Zero Day Initiative
Publication Date 2024-03-13
Original Reporting Source
Related Intrusion Sets DarkGate Operators (RastaFarEye)
Identified CVEs CVE-2023-36025 , CVE-2024-21412

This report by TrendMicro's Zero Day Initiative describes a campaign associated with the DarkGate ransomware. According to the post, DarkGate operators used fake software installers to exploit a Microsoft Windows SmartScreen bypass (CVE-2024-21412), leading to infection with DarkGate. Actors utilized PDFs with Google DoubleClick Digital Marketing open redirects to lure victims to compromised sites. The report includes detailed analysis of the infection process, including use of open redirects, exploitation of CVE-2024-21412, and sideloading DLL files.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques

ATT&CK ID Title Associated Tactics
T1105 Ingress Tool Transfer Command and Control
T1574.002 DLL Side-Loading Defense Evasion, Persistence, Privilege Escalation