Sodin ransomware exploits Windows vulnerability and processor architecture
#1
Bug 
Quote:
[Image: sodin_ransom_11.png]

When Sodin (also known as Sodinokibi and REvil) appeared in the first half of 2019, it immediately caught our attention for distributing itself through an Oracle Weblogic vulnerability and carrying out attacks on MSP providers. In a detailed analysis, we discovered that it also exploits the CVE-2018-8453 vulnerability to elevate privileges in Windows (rare among ransomware), and uses legitimate processor functions to circumvent security solutions.

According to our statistics, most victims were located in the Asia-Pacific region: Taiwan, Hong Kong, and South Korea.

Technical description

Vulnerability exploitation

To escalate privileges, Trojan-Ransom.Win32.Sodin uses a vulnerability in win32k.sys; attempts to exploit it were first detected by our proactive technologies (Automatic Exploit Prevention, AEP) in August last year. The vulnerability was assigned the number CVE-2018-8453. After the exploit is executed, the Trojan acquires the highest level of privileges.
Continue Reading
[-] The following 1 user says Thank You to harlan4096 for this post:
  • silversurfer
Reply
#2
Additional Info: https://www.kaspersky.com/blog/sodin-msp...are/27530/
[-] The following 1 user says Thank You to harlan4096 for this post:
  • silversurfer
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
[Test & Review Request] Looking for feed...
Hi Geeks, :D Followi...LFTyyy — 13:57
Manjaro Linux 26.0.4 Build 260327
Manjaro Linux 26.0...harlan4096 — 09:46
K-Lite Codec Pack 19.6.0 / 19.6.3 Update
Changes in 19.6.3 ...harlan4096 — 09:45
AdGuard Browser Extension 5.3.1.7
AdGuard Browser Ex...harlan4096 — 09:44
uBOLite 2026.329.1951 (already available...
uBOLite 2026.329.1...harlan4096 — 09:43

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
No upcoming birthdays.

[-]
Online Staff
There are no staff members currently online.

>