Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Windows Zero-Day Exploited by FruityArmor, SandCat Threat Groups

One of the zero-day vulnerabilities patched this week by Microsoft has been exploited in targeted attacks by several threats groups, including the ones known as FruityArmor and SandCat, Kaspersky Lab revealed on Wednesday.

One of the zero-day vulnerabilities patched this week by Microsoft has been exploited in targeted attacks by several threats groups, including the ones known as FruityArmor and SandCat, Kaspersky Lab revealed on Wednesday.

Microsoft’s latest Patch Tuesday updates address two Windows zero-day flaws that allow attackers to elevate privileges. One of them, CVE-2019-0808, was reported to Microsoft by Google’s Threat Analysis Group, which has seen it being exploited in targeted attacks alongside a Chrome zero-day.

The second zero-day, tracked as CVE-2019-0797, was reported to Microsoft by Kaspersky Lab, which believes the vulnerability has been exploited by several threat actors, including FruityArmor and SandCat.

FruityArmor has been known for several years. The group has been active since at least 2016, when it used a different Windows zero-day flaw to launch attacks on researchers, activists and individuals related to government organizations in Thailand, Iran, Algeria, Yemen, Saudi Arabia and Sweden.

More recently, FruityArmor used a Windows zero-day in attacks aimed at entities in the Middle East. Microsoft patched that vulnerability with its October 2018 updates.

SandCat, on the other hand, is a group that was discovered more recently by Kaspersky. One of the Windows vulnerabilities patched by Microsoft in December had been exploited by both FruityArmor and SandCat in attacks targeting the Middle East and Africa.

SandCat has been using FinFisher/FinSpy spyware and CHAINSHOT, a piece of malware analyzed earlier this year by Palo Alto Networks. The group has also used the CVE-2018-8589 and CVE-2018-8611 Windows vulnerabilities in its attacks, both of which had a zero-day status when Microsoft released fixes.

Anton Ivanov, security researcher at Kaspersky Lab, told SecurityWeek that the company does not have any information about the targets of the attacks involving the latest Windows zero-day, CVE-2019-0797.

Advertisement. Scroll to continue reading.

Kaspersky said it informed Microsoft of this security hole, which it described as a race condition in the Win32k driver, on February 22. The security firm has analyzed a piece of malware that exploits CVE-2019-0797 on devices running 64-bit versions of Windows 8 through Windows 10.

It’s worth noting that CVE-2019-0797 is the fourth actively exploited Windows flaw discovered in recent months by Kaspersky.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...