Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/uixss/poc-cve-2024-38178
A comprehensive analysis of the executing the malicious code without any user interaction
https://github.com/uixss/poc-cve-2024-38178
Last synced: about 20 hours ago
JSON representation
A comprehensive analysis of the executing the malicious code without any user interaction
- Host: GitHub
- URL: https://github.com/uixss/poc-cve-2024-38178
- Owner: uixss
- Created: 2024-10-24T14:59:32.000Z (15 days ago)
- Default Branch: main
- Last Pushed: 2024-10-24T15:48:12.000Z (15 days ago)
- Last Synced: 2024-10-25T19:50:47.584Z (14 days ago)
- Homepage:
- Size: 2.93 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
#Group123, after infiltrating an advertising company's server, deployed a backdoor using the IE 0day exploit CVE-2024-38178 within ad scripts. This strategy enables a zero-click attack as the ads are served, executing the malicious code without any user interaction.
https://github.com/blackorbird/APT_REPORT/blob/master/group123/(%E1%84%8C%E1%85%A5%E1%86%AB%E1%84%8E%E1%85%A6%E1%84%87%E1%85%A9%E1%86%AB)%E1%84%80%E1%85%A9%E1%86%BC%E1%84%80%E1%85%A2%E1%84%87%E1%85%A9%E1%84%80%E1%85%A9%E1%84%89%E1%85%A5-OperationCodeonToast.pdf
https://asec.ahnlab.com/ko/83876/