The Purple Fox EK continues to be improved by its authors that implemented two new exploits for Microsoft critical- and high-severity Microsoft vulnerabilities.
The Purple Fox EK appears to have been built to replace the notorious RIG exploit kit (EK) in the distribution of the Purple Fox Trojan. The authors of the Trojan also developed their own EK for distributing it to maximize their profits. The authors of the Purple Fox malware have stopped using the RIG EK and moved to an in-house EK, this confirms the goal to cut the cost.
In January, Microsoft has published a security advisory (ADV200001) that includes mitigations for the CVE-2020-0674 zero-day remote code execution (RCE) vulnerability affecting Internet Explorer. At the time, the tech giant confirmed that the CVE-2020-0674 zero-day vulnerability has been actively exploited in the wild.
An attacker could exploit the flaw to can gain the same user permissions as the user logged into the compromised Windows device. If the user is logged on with administrative permissions, the attacker can exploit the flaw to take full control of the system.
The CVE-2020-0674 flaw could be triggered by tricking victims into visiting a website hosting a specially crafted content designed to exploit the issue through Internet Explorer.
The CVE-2019-1458 Windows zero-day was addressed by Microsoft’s December 2019 Patch Tuesday, it was exploited in North Korea-linked attacks. The vulnerability could be exploited to execute arbitrary code in kernel mode.
The CVE-2019-1458 vulnerability is a privilege escalation issue related to how the Win32k component handles objects in memory.
Microsoft addresses this vulnerability by correcting how Win32k handles objects in memory.
The vulnerability was reported by Kaspersky, experts at the security firm confirmed that the CVE-2019-1458 flaw has been exploited in a campaign called Operation WizardOpium.
“In this latest revision to the Purple Fox EK, we see the authors adding attacks against both CVE-2020-0674 and CVE-2019-1458, two vulnerabilities that came out at the end of 2019 and early 2020.” reads the analysis published by ProofPoint.
The experts uncovered a malvertising campaign at the end of June, threat actors were using the Purple Fox EK to trigger the CVE-2020-0674 on Windows 10 via Internet Explorer 11.
The CVE-2020-0674 exploit targets Internet Explorer’s usage of jscript.dll, a Windows library. Upon starting the attack, the malicious script attempts to leak an address from the RegExp implementation within jscript.dll, then use the address to search for PE header of jscript.dll, and then uses it to locate an import descriptor for kernel32.dll.
The descriptor for kernel32.dll contains the process and memory manipulation functions required for the EK to load the actual shellcode.
“In particular, the function GetModuleHandleA is used to obtain the running module handle,” continues the experts. “This handle is used along with GetProcAddress to locate VirtualProtect, which is in turn used to enable ‘read, write, execute’ (RWX) permissions on the shellcode. Finally, the shellcode is triggered by calling an overwritten implementation of RegExp::test.”
The shellcode is used to locate WinExec to create a new process by running the command “mshta <payload URL> which begins the actual execution of the malware.
Experts highlight the role of the Exploit kits in the threat landscape, they continue to be part of some attack chains even if they are not as prevalent as they were a few years ago.
“One thing that hasn’t changed regarding exploit kits is the way in which exploit-kit authors regularly update to include new attacks against newly discovered vulnerabilities,” researchers conclude. “In this latest revision to the Purple Fox EK, we see the authors adding attacks against both CVE-2020-0674 and CVE-2019-1458, two vulnerabilities that came out at the end of 2019 and early 2020. This tells us that the authors of Purple Fox are staying up to date on viable exploitable vulnerabilities and updating when they become available. It’s reasonable to expect that they will continue to update as new vulnerabilities are discovered.”
(SecurityAffairs – hacking, Purple Fox EK)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.