- The WicKed Web Weekly
- Posts
- Windows CLFS Driver: A Hacker's Playground
Windows CLFS Driver: A Hacker's Playground
It's been a wild ride in cyberspace, with hackers playing a game of cat and mouse with security experts.
Good morning, tech enthusiasts! Let's dive into the digital world's latest dramas. It's been a wild ride in cyberspace, with hackers playing a game of cat and mouse with security experts. First up, we have the tale of Windows CLFS Driver, turning into a hacker's playground. It's like leaving your front door wide open with a neon "Welcome" sign for cybercriminals. Then, we swung by Google's neighborhood, where Chrome found itself patching its eighth zero-day vulnerability of the year. It's like Whack-A-Mole, but with more serious consequences. And finally, we encountered the shadowy 'BattleRoyal' hackers, using every trick in the book to spread their DarkGate RAT. It's a digital heist story with more twists than a pretzel factory. So buckle up, as we navigate through these cyber sagas that remind us the internet is more than just cat videos and memes.

Windows CLFS Driver: A Hacker's Playground
2023 has been a field day for cyber attackers, exploiting a series of vulnerabilities in Windows Common Log File System (CLFS) driver, crucial for kernel-level operations. A recent Kaspersky Securelist report highlighted this alarming trend.
The Issue with CLFS
CLFS, essential for high-performance logging, has been under siege by hackers, exploiting its kernel access and performance-centric design, leaving gaping security holes. Ransomware groups like Nokoyawa have been exploiting vulnerabilities like CVE-2023-28252.
Design Flaws: Boris Larin from Kaspersky points out the inherent design problems in CLFS. Its emphasis on performance over security, complicated parsing of files, and relative offsets handling make it a hotbed for bugs. The vulnerabilities exploited in 2023, including CVE-2022-24521 and CVE-2022-37969, all high-severity, underscore this issue.
A Call to Action: Larin advises organizations to install security updates promptly, use endpoint security products, limit server access, and enhance employee training against spear-phishing.
Zooming Out: Without a major redesign, CLFS remains vulnerable. The balance between performance and security is a tightrope that Microsoft needs to walk carefully to prevent further exploits.

Google Chrome's Vulnerability: CVE-2023-7024
2023 marks Google Chrome's struggle with its eighth zero-day vulnerability, CVE-2023-7024, a critical heap buffer overflow flaw within its WebRTC module, now patched after active exploitation.
The Threat of CVE-2023-7024
This vulnerability poses a significant threat, as it allows remote code execution (RCE) in Chrome’s renderer process, potentially enabling attackers to run arbitrary binary code on users' devices. However, as Lionel Litty of Menlo Security highlights, the code remains sandboxed, limiting direct damage to the system.
The Bigger Picture: The vulnerability's true danger lies in its potential use as the first step in an exploit chain, requiring an additional sandbox escape vulnerability to inflict more severe damage. Chrome's Site Isolation feature offers some protection, but there are nuances to consider, especially in how the bug exposes target origins to malicious origins.
Wider Implications: Aubrey Perin from Qualys notes the reach of this bug extends beyond Google Chrome to browsers like Microsoft Edge that use Chromium. The vulnerability's exploitation is tied to Chrome’s ubiquity, making it a prime target for cybercriminals.
A Growing Concern: Major browser vendors have reported an increase in zero-day bugs. This highlights the importance of vigilant patching and updating systems to defend against such vulnerabilities.
Expert Insight: Joseph Carson from Delinea emphasizes the need for organizations to investigate systems with this vulnerability for potential risks or impacts, given its active exploitation and the likelihood of attackers targeting vulnerable systems for an extended period.

'BattleRoyal' Hackers: Masters of Malware Delivery
A new threat actor, dubbed "BattleRoyal," has been making waves in the cyber world by targeting North American organizations with the sophisticated DarkGate malware.
BattleRoyal's Arsenal of Tricks
Using a blend of social engineering tactics, BattleRoyal has conducted numerous email phishing campaigns and employed fake browser updates to spread malware. Proofpoint researchers note the group's use of content style sheets (CSS) steganography to hide malicious code and Traffic Distribution Systems (TDSs) to filter and redirect targeted traffic.
Email Phishing: BattleRoyal's preferred method, involving tens of thousands of emails, typically starts with mundane messages containing links that use TDSs. These systems, specifically 404 TDS and Keitaro TDS, play a crucial role in ensuring that only the intended targets are compromised.
Exploiting CVE-2023-36025: The group has leveraged this critical bypass vulnerability in Microsoft Defender SmartScreen to redirect users to phishing sites, bypassing Windows defenses.
DarkGate Malware and Beyond
Originally, BattleRoyal employed DarkGate, a multifaceted loader-cryptominer-remote access Trojan (RAT), distributed via malicious URL files. However, amid rising popularity and scrutiny of DarkGate, they recently shifted to using NetSupport, a legitimate remote control tool repurposed for malicious activities.
The Impact: The switch to NetSupport may indicate either an attempt to evade detection due to DarkGate's increased exposure or a temporary change in tactics.
Expert Insights: Selena Larson from Proofpoint highlights the diverse and evolving nature of BattleRoyal's techniques, reflecting a sophisticated approach to cybercrime and malware distribution.