News
  • Elena R
    author-profile

    Elena R right arrow

    Author

    Elena is an expert in technical analysis and risk management in cryptocurrency market. She has 10+year experience in writing - accordingly she is avid journalists with a passion towards researching new insights coming into crypto erena.

    • author twitter

  • 1 minute read

Crypto Scam Exposed! Here’s How Lazarus Uses DeFi Games to Steal Your Money

Story Highlights
  • Lazarus APT, specifically BlueNoroff, is a sophisticated North Korean hacking group targeting the financial sector, especially cryptocurrency exchanges.

  • The group leverages advanced techniques, including zero-day exploits and social engineering.

  • Recent attacks highlight the importance of staying vigilant against evolving threats and keeping software up-to-date to protect against vulnerabilities.

Lazarus APT, particularly its BlueNoroff subgroup, has become infamous for its high-level cyber attacks on the financial industry, especially targeting cryptocurrency-related businesses. This North Korean-linked hacking group has conducted numerous attacks on major organizations, using advanced malware and exploit techniques to breach defenses.

As the cryptocurrency market continues to soar, so too does the risk of cyberattacks. To understand the full extent of this threat and the tactics employed by these cybercriminals, read on.

Lazarusโ€™ Tools: Manuscrypt, Cutwail, and Turk Power the Campaigns

Since 2013, Lazarus has relied on tools like Manuscrypt, Cutwail, and Turk in over 50 successful campaigns. These powerful tools have helped the group infiltrate targets worldwide, highlighting their technical skill and persistence.

In May 2024, Kaspersky analysts detected the Manuscrypt malware within a Russian system connected to a deceptive website, detankzone[.]com. This site, disguised as a legitimate DeFi NFT game, exploited a zero-day vulnerability in Chromeโ€™s V8 JavaScript engine. This flaw allowed attackers to take full control of any device visiting the site. Following Kasperskyโ€™s report, Google quickly patched the vulnerability and removed all related fake websites.

Blending Technology and Social Engineering

Alongside technical exploits, Lazarus used social engineering by creating fake LinkedIn and X (formerly Twitter) accounts to promote a fake game, โ€œDeTankZone.โ€ They also used a real game, โ€œDeFiTankLand,โ€ as a cover, releasing a convincing game demo to trick users into downloading malware.

This combination of technical hacking and social manipulation underscores Lazarusโ€™ adaptability in bypassing security measures in the crypto industry.

Crypto Investors, Take Note!

This campaign illustrates Lazarus’ ability to evade even the latest security protections. By pairing zero-day vulnerabilities with social engineering, they continue to pose a serious threat to crypto investors.

Whatโ€™s your take on Lazarusโ€™ latest tactics? Can the crypto sector keep up?

Show More

Related Articles

Back to top button