North Korean Hackers Exploit Chromium Browsers Zero-Day Vulnerability (CVE-2024-7971) to Steal Cryptocurrencies

Friday, 30 August 2024, 22:34

North Korean hackers have exploited a Google Chrome vulnerability (CVE-2024-7971) to target cryptocurrencies, as per Microsoft security researchers. This zero-day flaw allowed remote code execution in Chromium browsers, which was actively used in attacks coinciding with the recent discovery. The exploitation marks a significant advancement in cyber threats aimed at the cryptocurrency sector.
Indiatimes
North Korean Hackers Exploit Chromium Browsers Zero-Day Vulnerability (CVE-2024-7971) to Steal Cryptocurrencies

Overview of the Google Chrome Vulnerability

A North Korean hacking group, widely recognized under the alias Citrine Sleet, has successfully exploited a zero-day vulnerability in Google Chrome, identified as CVE-2024-7971. Microsoft security researchers revealed that this flaw, discovered on August 19, 2024, allows for malicious actors to execute remote code within Chromium-based browsers.

Details of the Exploit

The vulnerability was leveraged to conduct targeted attacks against cryptocurrency organizations. Victims were directed to a malicious domain, voyagorclub[.]space, which likely utilized social engineering tactics to lure potential targets.

Attack Methodology

  • Upon connecting to the malicious domain, the Chrome exploit was delivered.
  • This was followed by a subsequent exploit aimed at the Windows kernel, CVE-2024-38106, enabling hackers to bypass browser protections.
  • Ultimately, a rootkit named FudModule was deployed to gain deeper access.

Citrine Sleet's History and Tactics

Known for a series of attacks targeting the cryptocurrency sector, Citrine Sleet, also referred to as AppleJeus and Labyrinth Chollima, utilizes various methods such as fake websites and trojanized crypto applications.

Implications for the Cryptocurrency Sector

As Google has confirmed the vulnerability was patched by August 21, 2024, the incident underscores ongoing cyber risks faced by cryptocurrency firms. The growing sophistication of attacks necessitates heightened vigilance and security measures among crypto-related organizations.


This article was prepared using information from open sources in accordance with the principles of Ethical Policy. The editorial team is not responsible for absolute accuracy, as it relies on data from the sources referenced.


Related posts


Newsletter

Get the most reliable and up-to-date financial news with our curated selections. Subscribe to our newsletter for convenient access and enhance your analytical work effortlessly.

Subscribe