Flaw in ESET security software used to spread malware from ToddyCat group
研究人员发现网络安全公司ESET软件存在漏洞(CVE-2024-11859),可能被国家支持的黑客利用植入恶意代码。该漏洞允许攻击者通过ESET杀毒软件执行恶意DLL文件,在后台隐蔽运行以窃取数据。ESET已修复该中等严重性漏洞(CVSS 6.8)。未明确攻击影响范围及目标身份。 2025-4-7 15:45:49 Author: therecord.media(查看原文) 阅读量:6 收藏

Researchers have discovered that suspected state-backed hackers could exploit a vulnerability in software from cybersecurity firm ESET to secretly infect targeted devices with malicious code.

The vulnerability, tracked as CVE-2024-11859, allows attackers to plant a malicious dynamic-link library (DLL) and execute it through the ESET antivirus scanner, according to a report by the Russian cybersecurity firm Kaspersky. The malicious code runs in the background, bypassing system alerts and remaining undetected.

Slovakia-based ESET confirmed the flaw in an advisory last week and released a fix, describing it as a medium-severity issue with a CVSS score of 6.8 out of 10. The company urged users to update their systems to prevent potential exploitation.

It remains unclear whether any users were affected by attacks exploiting the ESET flaw or who the specific targets were. ESET has not responded to Recorded Future News' request for comment.

Kaspersky attributed the campaign to a hacker group known as ToddyCat, which has been active since at least 2020 and is known for targeting government and military organizations to steal sensitive data.

During the campaign, the hackers loaded a new tool dubbed TCDSB onto victims' devices, disguising it as a legitimate DLL — a common file type in the Windows operating system. It is designed to to stealthily execute payloads while avoiding security and monitoring services. According to researchers, TCDSB is based on a previously known tool, EDRSandBlast, which cybercriminals use to bypass security protections.

The hackers likely modified the original code to extend the malware’s functionality, allowing it to alter key components of the operating system and disable system alerts that would typically notify users about events such as the creation of a new process or the loading of a file. TCDSB was found on multiple devices, Kaspersky said, but didn’t provide further details.

Russian researchers have not attributed ToddyCat to any specific nation-state, but previous reports suggest the group has targeted high-profile entities in Europe and Asia, as well as digital infrastructure in Taiwan and Vietnam. Other research has linked ToddyCat to “Chinese espionage activity.”

“This technique did not elevate privileges, though — the attacker would have already needed administrator privileges to perform this attack,” ESET said.

In an earlier campaign described by Kaspersky, ToddyCat targeted government services in the Asia-Pacific region to steal “large volumes of data.” Once inside a victim’s network, the group used various tunneling methods, including compromising VPN software and legitimate cloud providers.

By using different tunneling techniques, Kaspersky said, ToddyCat aimed to ensure that if one data-stealing method failed, others would still be available.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/eset-software-vulnerability-malware-toddycat-apt
如有侵权请联系:admin#unsafe.sh