Suspected North Korean hackers targeted crypto industry with Chromium zero-day

Avatar

Hackers allegedly connected to the North Korean government targeted the cryptocurrency industry using a zero-day affecting the Chromium browser.

Microsoft revealed the campaign in a blog post on Friday, pointing the blame at a threat actor they call “Citrine Sleet.”

The group has previously been attributed to a unit of North Korea’s Reconnaissance General Bureau.

The tech giant noted that some of the tools involved in the campaign were used by other North Korean groups including one they call Diamond Sleet.

The vulnerability being exploited, CVE-2024-7971, was patched by Google last week. Google acknowledged that Microsoft notified them of the vulnerability on August 19.

The top cybersecurity agency in the U.S. added CVE-2024-7971 to a catalog of vulnerabilities known to have been exploited. Federal civilian agencies have until September 16 to patch the bug on government systems.

According to Microsoft, Citrine Sleet focuses its attacks on financial institutions and cryptocurrency firms, creating networks of fake websites that are used to send fictitious job applications.

Some incidents involved the hackers attempting to have victims download malicious crypto wallets or trading applications made to look like legitimate platforms. 

“Citrine Sleet most commonly infects targets with the unique trojan malware it developed, AppleJeus, which collects information necessary to seize control of the targets’ cryptocurrency assets,” they said.

The hackers used a fake domain they controlled at voyagorclub[.]space — a potential reference to a now defunct crypto platform. From there, CVE-2024-7971 is exploited.

A strain of malware called “FudModule” is then deployed. Microsoft noted that the malware has been in use since 2021 by other North Korean groups.

At least one of the victims in this campaign was previously targeted by another North Korean group and Microsoft tied the attacks to a larger effort by Pyongyang to exploit vulnerabilities at “cryptocurrency technology firms, gaming companies, and exchanges to generate and launder funds to support the North Korean regime.”

North Korea’s government has made hacking cryptocurrency platforms a key pillar of its revenue strategy, netting $3 billion from attacks between 2017 and 2023, according to United Nations investigators.

CybercrimeGovernmentNation-stateNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

US agencies warn against ransomware group behind hundreds of attacks in recent months

Next Post

Malicious North Korean packages appear again in open source code repository

Related Posts

Microsoft Issues Patches for 51 Flaws, Including Critical MSMQ Vulnerability

Microsoft has released security updates to address 51 flaws as part of its Patch Tuesday updates for June 2024. Of the 51 vulnerabilities, one is rated Critical and 50 are rated Important. This is in addition to 17 vulnerabilities resolved in the Chromium-based Edge browser over the past month. None of the security flaws have been actively exploited in the wild, with one of them listed as
Avatar
Read More

GeoServer Vulnerability Targeted by Hackers to Deliver Backdoors and Botnet Malware

A recently disclosed security flaw in OSGeo GeoServer GeoTools has been exploited as part of multiple campaigns to deliver cryptocurrency miners, botnet malware such as Condi and JenX, and a known backdoor called SideWalk. The security vulnerability is a critical remote code execution bug (CVE-2024-36401, CVSS score: 9.8) that could allow malicious actors to take over susceptible instances. In
Avatar
Read More