Cyber Security News

Windows 0-Day Flaw Exploited by Lazarus to Gain Unauthorized Access

Security researchers at Avast have uncovered evidence that the notorious North Korean hacker group Lazarus exploited a previously unknown zero-day vulnerability in the Windows AFD.sys driver to gain kernel-level access to targeted systems.

The flaw tracked as CVE-2024-38193, was reported to Microsoft and patched as part of the company’s June 2024 Patch Tuesday updates.

The notorious Lazarus Group, a North Korean advanced persistent threat (APT) group, has actively exploited this flaw to gain unauthorized access to sensitive system areas. Microsoft has since issued a patch to address the vulnerability, underscoring the significance of this security breach.

The Lazarus Group, also known as APT38, is a highly sophisticated hacker collective believed to be backed by the North Korean government. Active since at least 2009, the group has been involved in numerous high-profile cyberattacks worldwide, targeting a wide range of industries, including financial institutions, government entities, and businesses.

Free Webinar on Detecting & Blocking Supply Chain Attack -> Book your Spot

Researchers Luigino Camastra and Milanek first uncovered the vulnerability in early June. They observed the Lazarus Group exploiting the AFD.sys driver, a crucial component of Windows that is responsible for handling advanced file operations.

The flaw allowed attackers to bypass security restrictions, granting them access to system areas typically off-limits to users and administrators. To conceal their activities, Lazarus employed a stealthy malware known as Fudmodule, which effectively evaded detection by security software.

The exploitation of this zero-day vulnerability is particularly concerning due to its potential impact on high-stakes industries. Targets included professionals in the cryptocurrency engineering and aerospace sectors, where attackers aimed to infiltrate networks and steal cryptocurrencies to fund their operations.

The sophisticated nature of this attack, combined with its high market value, highlights the increasing resourcefulness of cybercriminals in targeting sensitive fields.

In response to the threat, Microsoft has released a patch to rectify the vulnerability, thanks to the proactive efforts of Gen Threat Labs. The team provided Microsoft with detailed exploit code, enabling a swift resolution to the flaw.

According to Microsoft, “An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.”

This patch is crucial for protecting Windows users from potential attacks, and Microsoft urges all users to update their systems promptly to ensure continued security.

As cyber threats continue to evolve, individuals and organizations must remain vigilant and proactive in their cybersecurity measures. Regular system updates and awareness of potential vulnerabilities are essential steps in protecting against sophisticated cyber attacks, such as those orchestrated by the Lazarus Group.

Are you from SOC and DFIR Teams? Analyse Malware Incidents & get live Access with ANY.RUN -> Get 14 Days Free Acces

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned organizations worldwide about active exploitation…

4 hours ago

New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts

A sophisticated malware campaign targeting WordPress sites has emerged, utilizing PHP variable functions and cookie-based…

6 hours ago

Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers

An international ecosystem of sophisticated scam operations has emerged, targeting vulnerable populations through impersonation tactics…

7 hours ago

TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT

TransparentTribe, a Pakistani-nexus intrusion set active since at least 2013, has intensified its cyber espionage…

10 hours ago

Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks

As the festive season approaches, organizations are witnessing a disturbing increase in targeted attacks on…

12 hours ago

Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

The cybersecurity landscape experienced a significant shift in July 2025 when threat actors associated with…

13 hours ago