Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
overview
Microsoft has recently patched a Windows Kernel privilege escalation flaw, tracked as CVE-2024-21338 (CVSS 7.8). This vulnerability, impacting various Windows operating systems, is being actively exploited by the notorious North Korean threat actor, Lazarus.
The vulnerability affects the ‘appid.sys’ driver associated with Microsoft’s AppLocker security feature. Exploitation of CVE-2024-21338 allows for a fileless kernel attack. Threat actors are then able to evade the detection mechanism and escalate privileges. Lazarus utilized this exploit to establish kernel-level access and manipulate kernel objects with an updated version of the FudModule rootkit.
According to Avast researchers, exploiting a zero-day vulnerability in a built-in driver provides attackers with unmatched stealth, eliminating the need for custom drivers and allowing fileless kernel attacks. This evasion of detection mechanisms extends to systems with driver allowlisting, despite the irony of CVE-2024-21338 affecting an AppLocker driver.
Microsoft addressed the issue in their February 2024 Patch Tuesday updates, urging immediate system updates to prevent potential exploits. Lazarus has been exploiting CVE-2024-21338 since August 2023. Avertium recommends that users install the latest security updates from Microsoft as soon as possible.
INDICATORS OF COMPROMISE (IoCs)
A YARA rule and Targeted ETW Provider GUIDs can be found here.
SUPPORTING DOCUMENTATION