Crypto Hack Exposed: How Lazarus APT Is Using DeFi Games to Steal Your Crypto!

The post Crypto Hack Exposed: How Lazarus APT Is Using DeFi Games to Steal Your Crypto! appeared first on Coinpedia Fintech News

Lazarus APT, especially its subgroup BlueNoroff, is attributed to the professional hack attacks on the financial sector, especially those related to cryptocurrencies. This North Korean-linked cyber group has conducted numerous attacks of high profile targeting organizations and businesses, and using sophisticated malware and exploits. 

Three of its tools, namely Manuscrypt, Cutwail, and Turk, have made it possible for over 50 successful campaigns to take place effectively since the year 2013.

Recent Attack Campaign: An Analysis of the Detankzone Exploit

Cybersecurity analysts with Kaspersky in May 2024 pinpointed a Manuscrypt in a Russian system that originated from detankzone[.]com. Though rationalizing itself as a genuine DeFi NFT game, this site was hiding a zero-day Chrome vulnerability. 

The exploit was implanted into a weakness in the V8 JavaScript engine that allows the attackers to take full control of the victim’s computer the moment they visit the site. When Kaspersky reported the case, Google immediately dealt with this critical bug and closed all related fake web pages.

Social Engineering Tactics: Social Media Identity Cloning

Adding to this, Lazarus utilized social engineering and opened fake LinkedIn and X (previously Twitter) accounts to endorse a fake game called “DeTankZone.” DeFiTankLand was another real game whose source was used to release a faithful copy of a game demo, trusting which users downloaded malware. 

This blended approach emphasizes Lazarus’ flexibility in switching between technical and social approaches to overcome crypto space defenses.

Also Read :   Hackers Steal $20 Million from US Government’s Crypto Wallet   ,

A New & Evolving Danger to Crypto Investors

What is crucial for understanding this campaign is that Lazarus is still capable of evading such cutting-edge security protections using zero-day vulnerabilities along with social engineering approaches. 

The event remains relevant to emphasize on the stock and alertness, updates of the applications, and the cautious tendency of the clients, who are involved in cryptocurrency investments, as the threat actors do not stop evolving and improving techniques of attacks.

spot_imgspot_img

Subscribe

Related articles

POPCAT Aims for 30% Rally, 1:4 Risk-Reward Opportunity

The post POPCAT Aims for 30% Rally, 1:4 Risk-Reward...

Arthur Hayes’ Top Crypto Picks for Election Season

The post Arthur Hayes’ Top Crypto Picks for Election...

Bitcoin Crash Alert During US Election Week, Will BTC Price Plunge to $65K?

The post Bitcoin Crash Alert During US Election Week,...
spot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here