South Korean ERP Vendor’s Server Breached for Spreading Xctdoor Malware

Jul 03, 2024NewsroomMalware / Threat Intelligence

An South Korean company specializing in enterprise resource planning (ERP) had its server breached to distribute a Go-based backdoor named Xctdoor.

South Korean ERP Vendor's Server Hacked to Spread Xctdoor Malware

Jul 03, 2024NewsroomMalware / Threat Intelligence

South Korean ERP Vendor's Server Hacked to Spread Xctdoor Malware

An South Korean company specializing in enterprise resource planning (ERP) had its server breached to distribute a Go-based backdoor named Xctdoor.

Discovered by the AhnLab Security Intelligence Center (ASEC) in May 2024, the attack was not directly attributed to a known threat actor or group. However, ASEC mentioned that the tactics used bear similarities to those of Andariel, a subgroup within the notorious Lazarus Group, according to a report.

This incident echoes a previous North Korean cyberattack where the same ERP solution was utilized to spread malware like HotCroissant, which is similar to Rifdoor. This was achieved by embedding malicious code into a software update program.

Cybersecurity

According to ASEC’s analysis of the recent breach, the modified executable was used to run a DLL file from a specific location through the regsvr32.exe process instead of initiating a typical downloader.

The implicated DLL file, Xctdoor, is capable of extracting system details, monitoring keystrokes, capturing screenshots, and executing commands issued by the malicious actor.

“Xctdoor communicates with the [command-and-control] server via the HTTP protocol, with packet encryption utilizing the Mersenne Twister (MT19937) and Base64 algorithms,” as stated by ASEC.

Also involved in the attack is another malware known as XcLoader, which acts as an injector malware responsible for integrating Xctdoor into legitimate processes like “explorer.exe”.

ASEC also identified cases where poorly secured web servers were breached to install XcLoader since at least March 2024.

In a related development, a different North Korea-affiliated threat actor called Kimusky has been observed using a previously unrecorded backdoor dubbed HappyDoor since July 2021.

Cybersecurity

The malware propagation chains rely on spear-phishing emails to initiate a distribution campaign involving a compressed file. This file contains either an obfuscated JavaScript or dropper that, when executed, launches HappyDoor alongside a decoy file.

HappyDoor, a DLL file executed using regsvr32.exe, establishes communication with a remote server via HTTP to carry out data theft, file transfer, self-updates, and self-termination capabilities.

This campaign is part of a broader malware distribution effort led by the Konni cyber espionage group (also known as Opal Sleet, Osmium, or TA406), which aims to target South Korea by using phishing tactics impersonating the national tax service to deploy malware designed for sensitive data theft, according to security researcher Idan Tarab’s statements.

Interested in more articles like this? Stay connected with us on Twitter and LinkedIn for exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.