Press ESC to close

The Crypto Game of Lazarus APT: Investors vs. Zero-days

CategoryDetails
Threat ActorsLazarus APT, BlueNoroff subgroup
Campaign OverviewAttackers used a fake decentralized finance (DeFi) NFT-based tank game website to distribute malware. The website exploited a zero-day vulnerability in Google Chrome to gain control over the victim’s PC.
Target Regions (Or Victims)Government entities, diplomatic bodies, financial institutions, military contractors, cryptocurrency platforms, IT operators, gaming companies, universities, media outlets, casinos, security researchers
MethodologyExploit delivered via a website with a disguised game. The exploit targeted a zero-day vulnerability (CVE-2024-4947) in Google Chrome to execute remote code and gain control over the victim’s PC.
Product TargetedGoogle Chrome
Malware ReferenceManuscrypt (backdoor malware used by Lazarus APT)
Tools UsedTypeScript/React (for the malicious website), JavaScript (for the exploit), Google Chrome (targeted product)
Vulnerabilities ExploitedCVE-2024-4947: Vulnerability in Chrome’s V8 compiler pipeline, allowing remote code execution by bypassing the V8 sandbox
TTPsMalicious website serving a game as a bait, browser exploit targeting Chrome’s V8 engine, remote code execution
AttributionLazarus APT, BlueNoroff subgroup (North Korea)
RecommendationsUsers should update Google Chrome to the latest version (patched version includes CVE-2024-4947 fix).
SourceSecurelist by Kaspersky

Read full article: https://securelist.com/lazarus-apt-steals-crypto-with-a-tank-game/114282/

The above summary has been generated by an AI language model

Leave a Reply

Your email address will not be published. Required fields are marked *