Description

As per sources, the North Korean Lazarus hacking group exploited a Google Chrome zero-day vulnerability, tracked as CVE-2024-4947, using a fake decentralized finance (DeFi) game to target cryptocurrency enthusiasts. Discovered by Kaspersky on May 13, 2024, the attack involved the DeTankZone website, which promoted an NFT-based multiplayer online battle arena (MOBA) game themed around tanks. Lazarus heavily advertised the game through social media platforms, spear-phishing emails, and LinkedIn accounts targeting high-value individuals. Upon download, the game—based on stolen source code from the legitimate DeFiTankLand—appeared to function but failed after the login screen, as its backend was deactivated. The real attack occurred when victims visited the DeTankZone website, which hosted a malicious script exploiting the Chrome zero-day, a type confusion flaw in the V8 JavaScript engine. The exploit allowed Lazarus to access Chrome's memory, granting them control over cookies, passwords, and browsing history. They then used a second flaw to escape Chrome's sandbox and execute remote code, enabling further system compromise. The malware collected system information and sent it to Lazarus' command-and-control (C2) server to determine the value of the compromised machine. Google patched the vulnerability on May 25, 2024, with Chrome version 125.0.6422.60/.61. While Lazarus’ ultimate goal remains unclear, it is suspected they aimed to steal cryptocurrency from targeted individuals.