In a new report, Microsoft disclosed that they have been tracking multiple DPRK tactics in their targeting of offensive security professionals. On Tuesday, when this news was first announced, a Visual Studio C# project with a malicious prebuild event was a known attack vector. Based on Microsoft’s report, more is known about what the attackers used to gain information.
One such vector was using a malicious MHTML file to execute JavaScript locally on a device through Internet Explorer. Another method included a driver load to exploit CVE-2017-16238, but due to the driver mishandling of the exploit, the driver instead just crashes the user’s device.