Malicious ads exploited Internet Explorer zero day to drop malware

Share:

The North Korean hacking group ScarCruft launched a large-scale attack in May that leveraged an Internet Explorer zero-day flaw to infect targets with the RokRAT malware and exfiltrate data.

ScarCruft (aka “APT37” or “RedEyes”) is a state-sponsored cyber-espionage threat actor known for targeting systems in South Korea and Europe, as well as North Korean human rights activists and defectors, using phishing, watering hole, and Internet Explorer zero-days.

A new joint report by South Korea’s National Cyber Security Center (NCSC) and AhnLab (ASEC) outlines a recent ScarCruft campaign dubbed “Code on Toast,” which leveraged toast pop-up ads to perform zero-click malware infections.

The flaw used in zero-day attacks is tracked as CVE-2024-38178 and is a high-severity type confusion flaw in Internet Explorer.

ASEC and NCSC, responding to the campaign, informed Microsoft immediately, and the tech giant released a security update to address CVE-2024-38178 in August 2024.

Interestingly, the researchers found that ScarCruft’s exploit was very similar to the one they used in the past for CVE-2022-41128, with the only addition being three lines of code designed to bypass Microsoft’s previous fixes.

From ‘Toast ads’ to malware

Toast notifications are pop-ups displayed in the corner of software such as antivirus or free utility programs to display notifications, alerts, or advertisements.

According to AhnLab, APT37 compromised one of the servers of a domestic advertising agency to push specially crafted ‘Toast ads’ on an unnamed free software used by a large number of South Koreans.

These advertisements included a malicious iframe that, when rendered by Internet Explorer, caused a JavaScript file named ‘ad_toast,’ to trigger remote code execution via the CVE-2024-38178 flaw in Internet Explorer’s JScript9.dll file (Chakra engine).

The malware dropped in this attack is a variant of RokRAT, which ScarCruft has been using in attacks for several years now.

RokRAT’s primary role is to exfiltrate files matching 20 extensions (including .doc, .mdb, .xls, .ppt, .txt, .amr) to a Yandex cloud instance every 30 minutes.

The malware also performs keylogging, monitors for clipboard changes, and captures screenshots (every 3 minutes).

APT37's attack chain
APT37’s attack chain
Source: ASEC

The infection is performed via a four-step process where an equal number of payloads are injected into the ‘explorer.exe’ process, evading detection by security tools.

If Avast or Symantec antivirus is detected on the host, the malware is injected into a random executable from the C:\Windows\system32 folder instead.

Persistence is achieved by adding a final payload (‘rubyw.exe’) to the Windows startup and registering it for execution in the system’s scheduler every four minutes.

Despite Microsoft announcing Internet Explorer’s retirement in mid-2022, many of the browser’s components remain in Windows or are used by third-party software, allowing threat actors to discover new vulnerabilities for use in attacks.

This may be happening without the users even realizing they’re on outdated software that can be easily exploited for zero-click attacks, laying the ground for mass-scale exploitation by knowledgeable threat actors.

What makes this worse is that even though Microsoft fixed this particular Internet Explorer flaw in August, it does not guarantee that it will be adopted immediately by tools using older components. Therefore, free software using outdated Internet Explorer components continues to put users at risk.

BleepingComputer asked ASEC about the number of impacted users and the name of the exploited free software, and we will update you with more information once available.

Bill Toulas

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
1:34 pm, Jun 26, 2025
weather icon 23°C
L: 21° | H: 24°
light rain
Humidity: 70 %
Pressure: 1010 mb
Wind: 15 mph SW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0.3 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:44 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
21° | 24°°C 0.24 mm 24% 17 mph 61 % 1018 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
16° | 28°°C 0 mm 0% 13 mph 61 % 1021 mb 0 mm/h
Sat Jun 28 10:00 pm
weather icon
17° | 28°°C 0.2 mm 20% 10 mph 88 % 1025 mb 0 mm/h
Sun Jun 29 10:00 pm
weather icon
19° | 32°°C 0 mm 0% 6 mph 82 % 1025 mb 0 mm/h
Mon Jun 30 10:00 pm
weather icon
21° | 34°°C 0.2 mm 20% 12 mph 59 % 1019 mb 0 mm/h
Today 4:00 pm
weather icon
23° | 23°°C 0.24 mm 24% 17 mph 61 % 1011 mb 0 mm/h
Today 7:00 pm
weather icon
21° | 22°°C 0 mm 0% 13 mph 47 % 1013 mb 0 mm/h
Today 10:00 pm
weather icon
17° | 17°°C 0 mm 0% 10 mph 47 % 1018 mb 0 mm/h
Tomorrow 1:00 am
weather icon
16° | 16°°C 0 mm 0% 8 mph 57 % 1020 mb 0 mm/h
Tomorrow 4:00 am
weather icon
16° | 16°°C 0 mm 0% 6 mph 61 % 1020 mb 0 mm/h
Tomorrow 7:00 am
weather icon
17° | 17°°C 0 mm 0% 8 mph 59 % 1021 mb 0 mm/h
Tomorrow 10:00 am
weather icon
22° | 22°°C 0 mm 0% 11 mph 52 % 1021 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
26° | 26°°C 0 mm 0% 12 mph 46 % 1020 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€91,655.70
0.12%
Ethereum(ETH)
€2,088.99
0.96%
Tether(USDT)
€0.86
-0.02%
XRP(XRP)
€1.86
-1.10%
Solana(SOL)
€122.58
-1.63%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.137763
-2.20%
Shiba Inu(SHIB)
€0.000009
-2.16%
Pepe(PEPE)
€0.000008
-6.76%
Scroll to Top