Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Windows Zero-Day Exploited by FruityArmor, SandCat Threat Groups

One of the zero-day vulnerabilities patched this week by Microsoft has been exploited in targeted attacks by several threats groups, including the ones known as FruityArmor and SandCat, Kaspersky Lab revealed on Wednesday.

One of the zero-day vulnerabilities patched this week by Microsoft has been exploited in targeted attacks by several threats groups, including the ones known as FruityArmor and SandCat, Kaspersky Lab revealed on Wednesday.

Microsoft’s latest Patch Tuesday updates address two Windows zero-day flaws that allow attackers to elevate privileges. One of them, CVE-2019-0808, was reported to Microsoft by Google’s Threat Analysis Group, which has seen it being exploited in targeted attacks alongside a Chrome zero-day.

The second zero-day, tracked as CVE-2019-0797, was reported to Microsoft by Kaspersky Lab, which believes the vulnerability has been exploited by several threat actors, including FruityArmor and SandCat.

FruityArmor has been known for several years. The group has been active since at least 2016, when it used a different Windows zero-day flaw to launch attacks on researchers, activists and individuals related to government organizations in Thailand, Iran, Algeria, Yemen, Saudi Arabia and Sweden.

More recently, FruityArmor used a Windows zero-day in attacks aimed at entities in the Middle East. Microsoft patched that vulnerability with its October 2018 updates.

SandCat, on the other hand, is a group that was discovered more recently by Kaspersky. One of the Windows vulnerabilities patched by Microsoft in December had been exploited by both FruityArmor and SandCat in attacks targeting the Middle East and Africa.

SandCat has been using FinFisher/FinSpy spyware and CHAINSHOT, a piece of malware analyzed earlier this year by Palo Alto Networks. The group has also used the CVE-2018-8589 and CVE-2018-8611 Windows vulnerabilities in its attacks, both of which had a zero-day status when Microsoft released fixes.

Anton Ivanov, security researcher at Kaspersky Lab, told SecurityWeek that the company does not have any information about the targets of the attacks involving the latest Windows zero-day, CVE-2019-0797.

Kaspersky said it informed Microsoft of this security hole, which it described as a race condition in the Win32k driver, on February 22. The security firm has analyzed a piece of malware that exploits CVE-2019-0797 on devices running 64-bit versions of Windows 8 through Windows 10.

It’s worth noting that CVE-2019-0797 is the fourth actively exploited Windows flaw discovered in recent months by Kaspersky.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.