Lazarus hackers used fake DeFi game to exploit Google Chrome zero-day

Share:

The North Korean Lazarus hacking group exploited a Google Chrome zero-day tracked as CVE-2024-4947 through a fake decentralized finance (DeFi) game targeting individuals in the cryptocurrency space.

Kaspersky discovered the attacks on May 13, 2024, and reported the Chrome zero-day flaw to Google.

Google issued a fix for CVE-2024-4947 on May 25, with Chrome version 125.0.6422.60/.61.

Lazarus tank games

Kaspersky discovered the campaign, which started in February 2024, after detecting a new variant of the “Manuscrypt” backdoor malware on the personal computer of one of its customers in Russia.

Lazarus has been using Manuscrypt for years, but the researchers were intrigued by the threat actor’s atypical targeting scope, which seemingly included random individuals.

Further telemetry showed that Google Chrome was exploited prior to the detection of the new Manuscrypt payload, with the exploitation originating from the “detankzone[.]com” website. This website promoted an NFT-based multiplayer online battle arena (MOBA) game themed around tanks named DeTankZone.

Lazarus promoted the game heavily through advertising campaigns on social media platforms like X, spear-phishing emails, and premium LinkedIn accounts used in direct attacks on high-value targets.

Upon downloading and reserve engineering the game, Kaspersky discovered the game was based on stolen source code from a legitimate game named DeFiTankLand, which Lazarus had simply rebranded for their purposes.

The 400MB ZIP download launches as expected, but it does not work past the login/registration screen as the backend infrastructure for the game was shut down. Furthermore, it did not perform any malicious actions on the target’s system.

The Google Chrome exploitation happens on the detankzone[.]com website itself, which contained a hidden script (index.tsx) designed to trigger an exploit for CVE-2024-4947, a type confusion in V8, Chrome’s Javascript engine.

Lazarus' exploit on the fake game site
Lazarus’ exploit on the decoy site
Source: Kaspersky

Lazarus’ exploit script corrupted Chrome’s memory by leveraging the app’s JIT compiler, Maglev, overwriting sections that eventually gave them access to the entire address space of Chrome’s process.

At this stage, the attackers could access cookies, authentication tokens, saved passwords, and browsing history.

 Heap corruption with manipulated arrays and structures
 Heap corruption with manipulated arrays and structures
Source: Kaspersky

Chrome’s V8 sandbox isolates JavaScript execution from the rest of the system, so Lazarus used a second flaw in V8 to escape it and achieve remote code execution, executing shellcode in the system’s memory.

“This issue (330404819) was submitted and fixed in March 2024,” explains Kaspersky about the V8 escape flaw.

“It is unknown whether it was a bug collision and the attackers discovered it first and initially exploited it as a 0-day vulnerability, or if it was initially exploited as a 1-day vulnerability.”

The shellcode Lazarus used serves as a reconnaissance tool, helping the attackers determine if the compromised machine is valuable enough to continue the attack.

It collected CPU, BIOS, and OS information, performed anti-VM and anti-debugging checks, and sent the information to Lazarus’ command-and-control (C2) server.

Kaspersky did not have the chance to examine the subsequent attack steps, as, by the time of their analysis, Lazarus had removed their exploit from the decoy site.

However,  based on the people the malicious campaign targeted and their past history, the attack’s ultimate goal was likely to steal cryptocurrency.

Bill Toulas

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
12:49 pm, Jun 22, 2025
weather icon 25°C
L: 24° | H: 27°
scattered clouds
Humidity: 49 %
Pressure: 1013 mb
Wind: 15 mph WSW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 40%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:43 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
24° | 27°°C 0 mm 0% 17 mph 64 % 1013 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
15° | 23°°C 0.2 mm 20% 15 mph 81 % 1016 mb 0 mm/h
Tue Jun 24 10:00 pm
weather icon
14° | 26°°C 0 mm 0% 16 mph 77 % 1015 mb 0 mm/h
Wed Jun 25 10:00 pm
weather icon
16° | 27°°C 0 mm 0% 9 mph 86 % 1013 mb 0 mm/h
Thu Jun 26 10:00 pm
weather icon
17° | 24°°C 1 mm 100% 15 mph 95 % 1018 mb 0 mm/h
Today 1:00 pm
weather icon
24° | 25°°C 0 mm 0% 15 mph 49 % 1013 mb 0 mm/h
Today 4:00 pm
weather icon
21° | 24°°C 0 mm 0% 17 mph 47 % 1013 mb 0 mm/h
Today 7:00 pm
weather icon
21° | 22°°C 0 mm 0% 13 mph 54 % 1012 mb 0 mm/h
Today 10:00 pm
weather icon
16° | 16°°C 0 mm 0% 10 mph 64 % 1012 mb 0 mm/h
Tomorrow 1:00 am
weather icon
16° | 16°°C 0 mm 0% 13 mph 76 % 1011 mb 0 mm/h
Tomorrow 4:00 am
weather icon
16° | 16°°C 0.2 mm 20% 13 mph 81 % 1011 mb 0 mm/h
Tomorrow 7:00 am
weather icon
15° | 15°°C 0.2 mm 20% 13 mph 60 % 1013 mb 0 mm/h
Tomorrow 10:00 am
weather icon
17° | 17°°C 0 mm 0% 13 mph 46 % 1014 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€89,111.93
-1.14%
Ethereum(ETH)
€1,972.93
-6.84%
Tether(USDT)
€0.87
0.02%
XRP(XRP)
€1.75
-5.47%
Solana(SOL)
€115.31
-6.66%
USDC(USDC)
€0.87
0.01%
Dogecoin(DOGE)
€0.134929
-4.93%
Shiba Inu(SHIB)
€0.000010
-4.95%
Pepe(PEPE)
€0.000008
-8.93%
Peanut the Squirrel(PNUT)
€0.218233
13.10%
Scroll to Top