Lazarus Group Exploits Zero-Day Chrome Vulnerability to Target Cryptocurrency Enthusiasts

Lazarus Group Exploits Zero-Day Chrome Vulnerability to Target Cryptocurrency Enthusiasts

Martin Kouyoumdjian |

The Growing Threat of Cyber Attacks on the Cryptocurrency Sector

The Lazarus Group, known for its cyber espionage campaigns, has once again raised alarms with its exploitation of a zero-day vulnerability in Google Chrome. Identified as CVE-2024-4947, this type confusion bug in the V8 JavaScript and WebAssembly engine is yet another testament to the group's persistent pursuit of high-value cyber targets. Cryptocurrency remains a lucrative focus due to its volatile nature and potential for high immediate returns.

Manipulating the Digital Gaming Arena

By creating a fake game website (detankzone[.]com), the attack drew potential victims under the guise of a promising DeFi NFT-based multiplayer online battle arena (MOBA) game titled DeTankZone. This technique highlights a sophisticated blend of social engineering where adversaries created an illusion of legitimacy and innovation to lure unsuspecting cryptocurrency enthusiasts. The website appeared professionally designed, complete with a downloadable trial version of the game.

The Lazarus Group enhanced this deception by establishing a social media presence. Utilizing platforms like X and LinkedIn, they orchestrated a convincing campaign with multiple accounts, promoting the fake game through generative AI-produced content and professional-grade graphic designs. This comprehensive approach underscores the evolving nature of cyber threats and the increased need for awareness and skepticism among potential targets.

Technical Exploitation and Breaches

Hidden within the bogus gaming platform was a sophisticated script targeting users with the chrome vulnerability. Once activated, this script launched a zero-day exploit that granted the group read and write access across the Chrome process's entire address space, effectively circumventing its security protocols. This breach stayed under the radar until Google patched the vulnerability in mid-May 2024, though it remains ambiguous whether the threat actors initially discovered it as a zero-day or later leveraged it as an N-day weakness.

The group's technical arsenal did not stop there. Another vulnerability allowed them further penetration by enabling access to memory outside the V8 sandbox register array bounds. Although patched in March 2024, this flaw underscores the multifaceted nature of the campaign, designed to exploit multiple weaknesses concurrently.

Further Exploitation and Covertness

Upon successful exploitation, the Lazarus Group deployed a custom script feared to assess the victim's system for assets worth pursuing. Despite the exact payload post-examination remaining a mystery, the suspicion of source code theft for the legitimate game DeFiTankLand fuels further concern. This breach resulted in the theft of $20,000 worth of DFTL2 coins, insinuating a crossover of digital theft into the economic fabric of gaming platforms.

Embedded in these malicious schemes is the utilization of the Manuscrypt backdoor, a notorious tool in the Lazarus arsenal. Its longevity in over 50 documented campaigns since 2013 signals the group’s commitment to tried-and-tested methodologies that continue to wreak havoc in unsuspecting systems.

Mitigation efforts are crucial in this escalating digital threat landscape. Keeping browsers updated is a significant defense, as is maintaining a healthy skepticism towards suspicious developments, be it download offers or enticing projects cloaked in investment appeal. The evolution of cyber threats requires vigilance and proactive measures to protect sensitive digital arenas like cryptocurrency from state-backed hackers.