Security

Cyber-crime

Security pros baited with fake Windows LDAP exploit traps

Tricky attackers trying yet again to deceive the good guys on home territory


Security researchers are once again being lured into traps by attackers, this time with fake exploits of serious Microsoft security flaws.

Trend Micro spotted what appears to be a fork of the legitimate proof-of-concept (PoC) exploit for LDAPNightmare, initially published by SafeBreach Labs on January 1. But the "forked" exploit PoC actually leads to the download and execution of information-stealing malware.

LDAPNightmare is the name of the PoC for CVE-2024-49113, a 7.5-severity denial-of-service bug in LDAP patched in Microsoft's December Patch Tuesday.

It was one of two LDAP bugs – the other being the critical CVE-2024-49112 – addressed in Microsoft's final updates of 2024. Trend Micro researcher Sarah Pearl Camiling said that "both vulnerabilities were deemed as highly significant due to the widespread use of LDAP in Windows environments," and thus of keen interest to defenders.

In the counterfeit PoC, the legitimate version's Python files were replaced with an executable called "poc.exe." If a user ran this, it would instead drop a PowerShell script, which then downloaded and executed another script from Pastebin, collecting various data points from the user.

The stolen data included:

Camiling noted that for experienced researchers, the bait scheme should have raised suspicions given that an executable was sitting inside a Python project. She didn't specify whether anyone had mistakenly fallen for it.

"Although the tactic of using PoC lures as a vehicle for malware delivery is not new, this attack still poses significant concerns, especially since it capitalizes on a trending issue that could potentially affect a larger number of victims," she blogged.

CVE-2024-49112, the more severe of the two LDAP vulnerabilities patched in December, received the highest severity score (9.8) in the 72-patch bundle, making it, and by association CVE-2024-49113, the vulnerabilities of note for security pros and sysadmins.

It's the latest of many attempts to beat researchers at their own game. On multiple occasions, North Korean attackers have attempted to target security researchers using various tactics.

For example, Google's Threat Analysis Group (TAG) noted in a 2021 report that state-sponsored miscreants were even burning zero-days to bust in and peer on those working on new vulnerabilities.

Rapid7 called it a "highly sophisticated attack" that followed others targeting experts at major vendors such as SonicWall, VMware, Mimecast, Malwarebytes, Microsoft, Crowdstrike, and SolarWinds.

One of the victims, Alejandro Caceres, founder of Hyperion Gray, told The Register about the "holy fuck" moment of realizing he'd been pwned by North Korea.

According to Caceres' account of the ordeal, someone using the name James Willy approached him on social media about working together on a zero-day vulnerability and only after submitting an analysis of it did he realize the Visual Studio project sent over was backdoored.

He said: "When I read the Google thing, I honestly think I said out loud 'holy fuck,' I thought it was insane. Attacked by a nation-state? Me!?"

Kim's cunning attackers were back at it in 2023 too, again using social media deception and burning zero-days in popular software to relay information about a target's PC back to home base.

They also hosted what seemed to be a legitimate Windows debugging tool on GitHub, which instead served as a vehicle for executing malicious code on unsuspecting users' machines. ®

Send us news
7 Comments

Windows 7 lives! How to keep your favorite fossil running

You probably shouldn't, but if you must, you can

Why did the Windows 95 setup use Windows 3.1?

If MS-DOS could play Doom, surely a battleship gray button was a possibility?

Cybersecurity not the hiring-'em-like-hotcakes role it once was

Ghost positions, HR AI no help – biz should talk to infosec staff and create 'realistic' job outline, say experts

Microsoft trims more CPUs from Windows 11 compatibility list

OEMs blowing dust from the processor stock cupboard, beware

Rather than add a backdoor, Apple decides to kill iCloud encryption for UK peeps

Plus: SEC launches new crypto crime unit; Phishing toolkit upgraded; and more

Harassment allegations against DEF CON veteran detailed in court filing

More than a dozen women came forward with accusations

Polish space agency confirms cyberattack

Officials vow to uncover who was behind it

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

Wallbleed vulnerability unearths secrets of China's Great Firewall 125 bytes at a time

Boffins poked around inside censorship engines – here's what they found

Signal will withdraw from Sweden if encryption-busting laws take effect

Experts warned the UK’s recent 'victory' over Apple would kickstart something of a domino effect

MITRE Caldera security suite scores perfect 10 for insecurity

Is a trivial remote-code execution hole in every version part of the training, or?

Trump’s DoD CISO pick previously faced security clearance suspension

Hey, at least Katie Arrington brings a solid resume