Lazarus Group Unleashes Blockchain Game To Exploit Chrome And Steal Crypto
The post Lazarus Group Unleashes Blockchain Game To Exploit Chrome And Steal Crypto appeared on BitcoinEthereumNews.com. A cybersecurity firm yesterday reported that a group of notorious hackers from North Korea was able to steal $3 billion worth of cryptocurrency from users by devising a fake blockchain game. Kaspersky Lab said that the Lazarus Group took advantage of a key vulnerability in the Google Chrome browser that allowed them to drain the crypto wallets of their victims. Lazarus Group: $3 Billion Crypto Heist It was reported that the North Korean hackers used the fake game to steal more than $3 billion in cryptocurrency — an operation the group successfully conducted within a six-year period, from 2016 to 2022. The heist is the adverse consequence of Google’s failure to patch a vulnerability in the Chrome browser. Meanwhile, a blockchain detective conducting a separate investigation found that the Lazarus Group executed 25 hacking attacks, laundering $200 million worth of crypto. It also uncovered the existence of a network of developers in North Korea that works for “established” cryptocurrency projects. The network allegedly gets a monthly paycheck of $500,000. Total crypto market cap currently at $2.2 trillion. Chart: TradingView The Dubious Game Plan Vasily Berdnikov and Boris Larin, analysts of Kaspersky Labs, said that the Lazarus Group created a fake game called DeTankZone or DeTankWar that revolves around Non-Fungible Tokens (NFTs) to siphon the crypto wallets of their victims. The analysts revealed that the hackers made use of the zero-day vulnerability in the Chrome browser in their unscrupulous act. Website appearance and the hidden exploit loader. Source: Kaspersky Lab Berdnikov and Larin explained that hackers used the fake game to persuade their victims and led them to a malicious website, which inject malware into their computers called Manuscript. With the use of Manuscript, the hackers were able to corrupt Chrome’s memory, allowing them to obtain users’ passwords, authentication tokens, and…
The post Lazarus Group Unleashes Blockchain Game To Exploit Chrome And Steal Crypto appeared on BitcoinEthereumNews.com.
A cybersecurity firm yesterday reported that a group of notorious hackers from North Korea was able to steal $3 billion worth of cryptocurrency from users by devising a fake blockchain game. Kaspersky Lab said that the Lazarus Group took advantage of a key vulnerability in the Google Chrome browser that allowed them to drain the crypto wallets of their victims. Lazarus Group: $3 Billion Crypto Heist It was reported that the North Korean hackers used the fake game to steal more than $3 billion in cryptocurrency — an operation the group successfully conducted within a six-year period, from 2016 to 2022. The heist is the adverse consequence of Google’s failure to patch a vulnerability in the Chrome browser. Meanwhile, a blockchain detective conducting a separate investigation found that the Lazarus Group executed 25 hacking attacks, laundering $200 million worth of crypto. It also uncovered the existence of a network of developers in North Korea that works for “established” cryptocurrency projects. The network allegedly gets a monthly paycheck of $500,000. Total crypto market cap currently at $2.2 trillion. Chart: TradingView The Dubious Game Plan Vasily Berdnikov and Boris Larin, analysts of Kaspersky Labs, said that the Lazarus Group created a fake game called DeTankZone or DeTankWar that revolves around Non-Fungible Tokens (NFTs) to siphon the crypto wallets of their victims. The analysts revealed that the hackers made use of the zero-day vulnerability in the Chrome browser in their unscrupulous act. Website appearance and the hidden exploit loader. Source: Kaspersky Lab Berdnikov and Larin explained that hackers used the fake game to persuade their victims and led them to a malicious website, which inject malware into their computers called Manuscript. With the use of Manuscript, the hackers were able to corrupt Chrome’s memory, allowing them to obtain users’ passwords, authentication tokens, and…
What's Your Reaction?