Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025

New Flodrix Botnet Option Operates Langflow Ai Server RCE BUG to launch DDOS ATTACKS

June 17, 2025

Lack of the TP-Link Cve-2023-33538 router under active operation, CISA releases an immediate warning

June 17, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » The Lazarus Group uses a vulnerability in Google Chrome to control infected devices
Global Security

The Lazarus Group uses a vulnerability in Google Chrome to control infected devices

AdminBy AdminOctober 24, 2024No Comments4 Mins Read
Chrome Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Chrome Vulnerability

A North Korean threat actor known as the Lazarus Group has been credited with exploiting a zero-day patched security flaw in Google Chrome to seize control of infected devices.

Cyber ​​security provider Kaspersky said that in May 2024, it discovered a new chain of attacks that targeted the personal computer of an unnamed Russian citizen using Manuscript backdoor

This entails running a zero-day exploit simply by visiting a fake gaming website (“detankzone(.)com”) that was targeted at people in the cryptocurrency sector. The campaign is estimated to launch in February 2024.

“On the surface, this website resembled a professionally designed product page for a NFT (non-fungible token) decentralized finance (DeFi)-based multiplayer online tank battle arena (MOBA) game, inviting users to download a trial version,” Kaspersky researchers . Boris Larin and Vasyl Berdnikov said.

Cyber ​​security

“But it was only a disguise. Under the hood, this site had a hidden script that ran in the user’s Google Chrome browser, launching a zero-day exploit and giving the attackers full control over the victim’s PC.”

The vulnerability in question CVE-2024-4947a type confusion bug in the V8 JavaScript engine and WebAssembly that Google fixed in mid-May 2024.

Using a malicious tank game (DeTankWar, ​​DeFiTankWar, ​​DeTankZone, or TankWarsZone) as a conduit to deliver malware is a tactic Microsoft attributes to another North Korean cluster of threat activity dubbed Moonstone.

These attacks are carried out by approaching potential targets via email or messaging platforms, tricking them into installing a game by pretending to be a blockchain company or game developer looking for investment opportunities.

Kaspersky’s latest findings add another piece to the attack puzzle, highlighting the role of the zero-day browser exploit in the campaign.

Specifically, the exploit contains code for two vulnerabilities: the first is used to give an attacker read-write access to the entire address space of the Chrome JavaScript process (CVE-2024-4947), and the second is used to circumvent V8 sandbox.

“The (second) vulnerability is that the virtual machine has a fixed number of registers and a dedicated array to store them, but the register indices are decoded from instruction bodies and not checked,” the researchers explained. “This allows attackers to access memory outside of the register array.”

V8 sandbox workaround was patched up Google in March 2024 after reporting the bug, which was submitted on March 20, 2024. However, it is currently unknown if attackers discovered it earlier and weaponized it as a zero-day, or if it was used as an N-day vulnerability.

After a successful exploit, the threat actor launches a validator, which takes the form of shellcode, responsible for collecting system information that is then used to determine whether the machine is valuable enough to take further action after the exploit. The exact payload delivered after this stage is currently unknown.

“What never ceases to amaze us is how much effort Lazarus APT puts into its social engineering campaigns,” the Russian company said, pointing out that the threat actor is contacting cryptocurrency influencers to help promote them. their malicious site.

“Over the course of several months, the attackers built up their social media presence, regularly posting to X (formerly Twitter) from multiple accounts and promoting their game with content created by generative artificial intelligence and graphic designers.”

Attacker activity was observed on X and LinkedIn, not to mention specially crafted websites and emails sent to targets of interest.

Cyber ​​security

The website is also designed to encourage visitors to download a ZIP archive (“detankzone.zip”) which, when launched, is a full-featured game that requires player registration, but also contains code to launch a custom bootloader codenamed YouieLoad, just like earlier. detail Microsoft.

Moreover, Lazarus Group is believed to have stolen the game’s source code from a legitimate play-to-earn (P2E) blockchain game called DeFiTankLand (DFTL) which suffered a own hack in March 2024, leading to the theft of $20,000 worth of DFTL2 coins.

Although the project developers blamed the hack on an insider, Kaspersky suspects that the Lazarus Group is behind it and that they stole the game’s source code along with DFTL2 coins and repurposed it for their own purposes.

“Lazarus is one of the most active and sophisticated APT actors, and financial gain remains one of their main motivations,” the researchers note.

“The tactics of attackers are evolving and they are constantly coming up with new, sophisticated social engineering schemes. Lazarus has already successfully started using generative artificial intelligence, and we predict that they will come up with even more sophisticated attacks with it.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025

New Flodrix Botnet Option Operates Langflow Ai Server RCE BUG to launch DDOS ATTACKS

June 17, 2025

Lack of the TP-Link Cve-2023-33538 router under active operation, CISA releases an immediate warning

June 17, 2025

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025

New Flodrix Botnet Option Operates Langflow Ai Server RCE BUG to launch DDOS ATTACKS

June 17, 2025

Lack of the TP-Link Cve-2023-33538 router under active operation, CISA releases an immediate warning

June 17, 2025

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025

New Flodrix Botnet Option Operates Langflow Ai Server RCE BUG to launch DDOS ATTACKS

June 17, 2025

Lack of the TP-Link Cve-2023-33538 router under active operation, CISA releases an immediate warning

June 17, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.