NVIDIA Merlin Flaw Enables Remote Code Execution as Root
September 25, 2025NVIDIA Merlin Flaw Enables Remote Code Execution as Root
September 25, 2025Severity
High
Analysis Summary
BlackMoon, also known as KrBanker, is a banking Trojan that first emerged in September 2015, initially targeting South Korean banks using a pharming technique to redirect users to fake banking websites and steal credentials. Over the years, it has undergone significant evolution, shifting from simple credential theft to more complex, multi-stage attacks. By late 2022, BlackMoon began targeting businesses in the USA and Canada, focusing on long-term persistence, evasion, and the delivery of additional malware rather than just credential harvesting.
As of 2025, recent campaigns have demonstrated the Trojan's use of modular architecture, allowing it to download spyware, adware, and tools for lateral movement within corporate networks. It employs advanced evasion techniques such as signed and obfuscated binaries, encrypted command-and-control (C2) channels, and the abuse of legitimate system tools like PowerShell, making it difficult to detect. Additionally, it leverages vulnerabilities in outdated VPN software and remote access tools to gain initial access. BlackMoon has effectively transitioned into a stealthy platform for malware delivery and system compromise, posing a persistent threat to business environments in North America.
Impact
- Data Exfiltration
- Credential Theft
- Financial Loss
Indicators of Compromise
MD5
bece6593173293201f711de6dead8e83
2574c7439e3390a9ae330d40c3e46124
d55458ad5b7f9934966c8d5cfa486de8
73c06c75bd9aa0a194b0dc73ab38cac5
a8c8255f395409004048b2f02ee1cde9
SHA-256
a2e6cc6a5b6d0717fe70542d56aa5e201d4c5ad0cd82d8662d25ce2eae8c691e
34a87671d9a7225ad9aafdca0bdff858b9ae1c8fcdf834c505268507052a7a80
17664f2a2b6f4e40d4ef63349f78f99487714cb097c505ac6f049b95cdc175b4
fde687287ef8cd7e6a6ce655355eaca2fba25fd6c22cc1e4040281f73205ba90
b0c551797d2a03abf305cd306ea17dc04219be31c5247452fc915dfd6515621e
SHA1
2320184955fd1be330df5ab8c81925f8d90b65c1
ff28ba1befdc619220efc4e5d852b6988b39b1e4
8bcd209c00b7d1ee6d19b60194dc2690cabeaa69
7604d4be31e6c017e3bd9a1e5590a81a7aafb40f
c947ef674cf8c6394302379c3d8fca0d27754be0
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.