TitleAuthorCreatedPublishedTags
Windows Vulnerability Exploited with Braille SpacesJon MarienJanuary 16, 2025--

Overview:

  • Vulnerability: Windows MSHTML Spoofing (CVE-2024-43461)
  • Exploited by: Void Banshee APT group
  • Targets: Organizations in North America, Europe, Southeast Asia
  • Objective: Install information-stealing malware

Attack Details:

  • Zero-Day Attacks: Used to deploy the Atlantida info-stealer
    • Data Stolen: Passwords, authentication cookies, cryptocurrency wallets
  • Methodology:
    • Utilized Windows Internet Shortcut files (.url) to open malicious sites in Internet Explorer
    • Downloaded malicious HTA files disguised as PDFs using braille whitespace characters

Technical Exploit:

  • Braille Whitespace Characters: Encoded as %E2%A0%80
    • Used to hide the .hta extension, making files appear as PDFs
    • Exploits a CWE-451 condition to deceive users
    • File appears as PDF in Windows prompts
    • Example filename:
      Books_A0UJKO.pdf[26 braille spaces].hta
    • Windows shows “Books_A0UJKO.pdf…” hiding true extension

Mitigation:

  • Patch Released: September 2024 Patch Tuesday
    • Fixes CVE-2024-43461 by displaying the actual .hta extension
    • Not perfect; whitespace may still mislead users

Highlight ”…” dots in photo:

Fixed prompt:

Presenter Notes

Presenter Notes:

  1. The attack uses 26 encoded braille whitespace characters (%E2%A0%80).
  2. Full filename example: Books_A0UJKO.pdf%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80.hta
  3. CWE-451 refers to User Interface (UI) Misrepresentation of Critical Information.
  4. This technique exploits how Windows handles long filenames in its user interface.
  5. The ’…’ in Windows prompts further obscures the true file extension.