{"id":61568,"date":"2024-12-08T22:29:37","date_gmt":"2024-12-08T22:29:37","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/"},"modified":"2024-12-08T22:31:01","modified_gmt":"2024-12-08T22:31:01","slug":"north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/","title":{"rendered":"North Korean hackers target South Korea with Internet Explorer vulnerabilities to deploy RokRAT malware"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<br \/><img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/cdn.mos.cms.futurecdn.net\/whgrKwRQB7aXbY99AX4Zp8-1200-80.jpg\" \/><\/p>\n<div id=\"article-body\">\n<hr\/>\n<ul>\n<li><strong>South Korean residents have been hit with a zero-click malware from the North<\/strong><\/li>\n<li><strong>The malware used pop-up adverts to put in payloads<\/strong><\/li>\n<li><strong>Keyloggers and different malicious surveillance software program was additionally put in<\/strong><\/li>\n<\/ul>\n<hr\/>\n<p>North Korean state-linked hacker ScarCruft just lately carried out a large-scale cyber-espionage marketing campaign utilizing an Web Explorer zero-day flaw to deploy RokRAT <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-malware-removal\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-malware-removal\">malware<\/a>, consultants have warned.<\/p>\n<p>The group, often known as APT37 or RedEyes, is a North Korean state-sponsored hacking group recognized for cyber-espionage actions.<\/p>\n<aside class=\"hawk-nest\" data-block-type=\"embed\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\"\/>\n<p>This group usually focuses on South Korean human rights activists, defectors, and political entities in Europe.<\/p>\n<h2 id=\"internet-explorer-zero-day-flaw-exploited-3\">Web Explorer Zero-Day flaw exploited<\/h2>\n<p>Over time, ScarCruft has developed a status for utilizing superior methods equivalent to phishing, watering gap assaults, and exploiting zero-day vulnerabilities in software program to infiltrate programs and steal delicate data.<\/p>\n<p>Their newest marketing campaign, dubbed &#8220;Code on Toast,&#8221; was revealed in a joint report by South Korea&#8217;s Nationwide Cyber Safety Middle (NCSC) and AhnLab (ASEC). This marketing campaign used a singular technique involving toast pop-up adverts to ship zero-click malware infections.<\/p>\n<p>The revolutionary facet of this marketing campaign lies in how ScarCruft used toast notifications &#8211; small pop-up adverts displayed by antivirus software program or free utility packages &#8211; to unfold their malware.<\/p>\n<p>ScarCruft compromised a home promoting company\u2019s server in South Korea to push malicious &#8220;Toast adverts&#8221; via a well-liked however unnamed free software program utilized by many South Koreans.<\/p>\n<div id=\"slice-container-newsletterForm-articleInbodyContent-vsrjvNB4GSnJR67x9mexk\" class=\"slice-container newsletter-inbodyContent-slice newsletterForm-articleInbodyContent-vsrjvNB4GSnJR67x9mexk slice-container-newsletterForm\">\n<div data-hydrate=\"true\" class=\"newsletter-form__wrapper newsletter-form__wrapper--inbodyContent\">\n<div class=\"newsletter-form__container\">\n<section class=\"newsletter-form__top-bar\"\/>\n<section class=\"newsletter-form__main-section\">\n<p class=\"newsletter-form__strapline\">Signal as much as the TechRadar Professional publication to get all the highest information, opinion, options and steerage what you are promoting must succeed!<\/p>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<p>These malicious adverts included a specifically crafted iframe that triggered a JavaScript file named \u2018ad_toast,\u2019 which executed the Web Explorer zero-day exploit. Through the use of this zero-click technique, ScarCruft was in a position to silently infect programs with out person interplay.<\/p>\n<p>The high-severity vulnerability in Web Explorer used on this assault is tracked as <a data-analytics-id=\"inline-link\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2024-38178\" target=\"_blank\" data-url=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2024-38178\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\">CVE-2024-38178<\/a> and has been given a severity rating of seven.5. The flaw exists in Web Explorer\u2019s JScript9.dll file, a part of its Chakra engine, and permits distant code execution if exploited. Regardless of Web Explorer\u2019s official retirement in 2022, lots of its elements stay embedded in Home windows or third-party software program, making them ripe targets for exploitation.<\/p>\n<p>ScarCruft\u2019s use of the CVE-2024-38178 vulnerability on this marketing campaign is especially alarming as a result of it intently resembles a earlier exploit they utilized in 2022 for CVE-2022-41128. The one distinction within the new assault is an extra three traces of code designed to bypass <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/tag\/microsoft\" data-auto-tag-linker=\"true\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/tag\/microsoft\">Microsoft<\/a>\u2019s earlier safety patches.<\/p>\n<p>As soon as the vulnerability is exploited, ScarCruft delivers RokRAT malware to the contaminated programs. RokRAT is primarily used to exfiltrate delicate knowledge with the malware focusing on recordsdata with particular extensions like .doc, .xls, .ppt, and others, sending them to a Yandex cloud each half-hour. Along with file exfiltration, RokRAT has surveillance capabilities, together with keylogging, clipboard monitoring, and screenshot seize each three minutes.<\/p>\n<p>The an infection course of consists of 4 levels, with every payload injected into the \u2018explorer.exe\u2019 course of to evade detection. If standard antivirus instruments like Avast or Symantec are discovered on the system, the malware is as a substitute injected right into a random executable from the C:Windowssystem32 folder. Persistence is maintained by inserting a closing payload, \u2018rubyw.exe,\u2019 within the Home windows startup and scheduling it to run each 4 minutes.<\/p>\n<p>By way of <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/malicious-ads-exploited-internet-explorer-zero-day-to-drop-malware\/\" target=\"_blank\" data-url=\"https:\/\/www.bleepingcomputer.com\/news\/security\/malicious-ads-exploited-internet-explorer-zero-day-to-drop-malware\/\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\"><em>BleepingComputer<\/em><\/a><\/p>\n<h3 class=\"article-body__section\" id=\"section-you-might-also-like\"><span>You may also like<\/span><\/h3>\n<\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/www.techradar.com\/pro\/North-Korean-hackers-target-South-Korea-with-internet-Explorer-vulnerabilities-to-deploy-RokRAT-malware\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>South Korean residents have been hit with a zero-click malware from the North The malware used pop-up adverts to put in payloads Keyloggers and different&#8230;<\/p>\n","protected":false},"author":1,"featured_media":61569,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-61568","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>North Korean hackers target South Korea with Internet Explorer vulnerabilities to deploy RokRAT malware - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"North Korean hackers target South Korea with Internet Explorer vulnerabilities to deploy RokRAT malware - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-08T22:29:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-08T22:31:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/12\/whgrKwRQB7aXbY99AX4Zp8-1200-80.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"970\" \/>\n\t<meta property=\"og:image:height\" content=\"545\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/12\\\/08\\\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/12\\\/08\\\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"North Korean hackers target South Korea with Internet Explorer vulnerabilities to deploy RokRAT malware\",\"datePublished\":\"2024-12-08T22:29:37+00:00\",\"dateModified\":\"2024-12-08T22:31:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/12\\\/08\\\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\\\/\"},\"wordCount\":592,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/12\\\/08\\\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/whgrKwRQB7aXbY99AX4Zp8-1200-80.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/12\\\/08\\\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/12\\\/08\\\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/12\\\/08\\\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\\\/\",\"name\":\"North Korean hackers target South Korea with Internet Explorer vulnerabilities to deploy RokRAT malware - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/12\\\/08\\\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/12\\\/08\\\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/whgrKwRQB7aXbY99AX4Zp8-1200-80.jpg\",\"datePublished\":\"2024-12-08T22:29:37+00:00\",\"dateModified\":\"2024-12-08T22:31:01+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/12\\\/08\\\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/12\\\/08\\\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/12\\\/08\\\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/whgrKwRQB7aXbY99AX4Zp8-1200-80.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/whgrKwRQB7aXbY99AX4Zp8-1200-80.jpg\",\"width\":970,\"height\":545},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/12\\\/08\\\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"North Korean hackers target South Korea with Internet Explorer vulnerabilities to deploy RokRAT malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"North Korean hackers target South Korea with Internet Explorer vulnerabilities to deploy RokRAT malware - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/","og_locale":"en_US","og_type":"article","og_title":"North Korean hackers target South Korea with Internet Explorer vulnerabilities to deploy RokRAT malware - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2024-12-08T22:29:37+00:00","article_modified_time":"2024-12-08T22:31:01+00:00","og_image":[{"width":970,"height":545,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/12\/whgrKwRQB7aXbY99AX4Zp8-1200-80.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"North Korean hackers target South Korea with Internet Explorer vulnerabilities to deploy RokRAT malware","datePublished":"2024-12-08T22:29:37+00:00","dateModified":"2024-12-08T22:31:01+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/"},"wordCount":592,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/12\/whgrKwRQB7aXbY99AX4Zp8-1200-80.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/","url":"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/","name":"North Korean hackers target South Korea with Internet Explorer vulnerabilities to deploy RokRAT malware - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/12\/whgrKwRQB7aXbY99AX4Zp8-1200-80.jpg","datePublished":"2024-12-08T22:29:37+00:00","dateModified":"2024-12-08T22:31:01+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/12\/whgrKwRQB7aXbY99AX4Zp8-1200-80.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2024\/12\/whgrKwRQB7aXbY99AX4Zp8-1200-80.jpg","width":970,"height":545},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/12\/08\/north-korean-hackers-target-south-korea-with-internet-explorer-vulnerabilities-to-deploy-rokrat-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"North Korean hackers target South Korea with Internet Explorer vulnerabilities to deploy RokRAT malware"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/61568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=61568"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/61568\/revisions"}],"predecessor-version":[{"id":61570,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/61568\/revisions\/61570"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/61569"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=61568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=61568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=61568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}