🛡 H3lium@infosec.exchange/:~# :blinking_cursor:<p>"🚨 ScreenConnect Exploits Unleash ToddleShark Malware by Kimsuky 🚨"</p><p>Kimsuky, the North Korean APT, leverages vulnerabilities in ScreenConnect (CVE-2024-1708 & CVE-2024-1709) to deploy ToddleShark, aiming at espionage. This polymorphic malware uses Microsoft binaries for stealth and conducts extensive data theft. It's an evolution of Kimsuky's espionage toolkit, hinting at their refined strategies for long-term intelligence gathering. ToddleShark manipulates registry settings, employs scheduled tasks for persistence, and exfiltrates data using PEM certificates, showcasing advanced obfuscation and evasion techniques. Be vigilant and patch up! </p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NorthKorea</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/ScreenConnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ScreenConnect</span></a> <a href="https://infosec.exchange/tags/CVE2024_1708" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE2024_1708</span></a> <a href="https://infosec.exchange/tags/CVE2024_1709" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE2024_1709</span></a> <a href="https://infosec.exchange/tags/ToddleShark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ToddleShark</span></a> <a href="https://infosec.exchange/tags/Kimsuky" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kimsuky</span></a> <a href="https://infosec.exchange/tags/DataTheft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataTheft</span></a> <a href="https://infosec.exchange/tags/Espionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Espionage</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p><p>Source: <a href="https://www.bleepingcomputer.com/news/security/screenconnect-flaws-exploited-to-drop-new-toddleshark-malware/" rel="nofollow noopener" target="_blank">BleepingComputer.com</a></p><p><a href="https://attack.mitre.org/groups/G0094/" rel="nofollow noopener" target="_blank">Mitre - Kimsuky</a></p>