Cyber Threat Report: 'CVE-2024-21412: DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign'
Report Author | Zero Day Initiative |
---|---|
Publication Date | 2024-03-13 |
Original Reporting | Source |
Related Intrusion Sets | DarkGate Operators (RastaFarEye) |
Identified CVEs | CVE-2023-36025 , CVE-2024-21412 |
This report by TrendMicro's Zero Day Initiative describes a campaign associated with the DarkGate ransomware. According to the post, DarkGate operators used fake software installers to exploit a Microsoft Windows SmartScreen bypass (CVE-2024-21412), leading to infection with DarkGate. Actors utilized PDFs with Google DoubleClick Digital Marketing open redirects to lure victims to compromised sites. The report includes detailed analysis of the infection process, including use of open redirects, exploitation of CVE-2024-21412, and sideloading DLL files.
Cyber Threat Graph Context
Explore how this report relates to the wider threat graph