Crypto2Community
HomeCrypto NewsReviewsGuidesGamblingTradingPress Release

Crypto 2 Community

  • About Us
  • Editorial Policy
  • Why Trust Us
  • Contact Us
  • Privacy Policy
  • Submit a Press Release

Cryptocurrency

  • Best Cryptos to Buy Now
  • Best Crypto Exchanges
  • How To Buy Cryptocurrency
  • Best Crypto Wallets
  • Best Altcoins to Buy

Gambling

  • Best Bitcoin Casinos
  • Best Ethereum Casinos
  • Best Crypto Live Casinos
  • Best Crypto Faucet Casinos
  • Provably Fair Bitcoin Casinos

Best Platforms

  • eToro Review
  • BC.Game Review
  • Jackbit Review
  • Metaspins Review
  • CryptoLeo Review

© 2026 Crypto2Community.com

CAUTION: The content presented on this platform is not intended as financial guidance, and we lack the authorization to offer investment advice. Any material found on this website should not be construed as an endorsement or recommendation of any specific trading strategy or investment decision. The information provided herein is of a general nature, and therefore it is essential to evaluate it in the context of your objectives, financial circumstances, and requirements.

Investment activities involve speculation and entail inherent risks to your capital. This website is not intended for utilization in jurisdictions where the described trading or investment activities are prohibited, and it should only be accessed by individuals who are legally permitted to do so. Depending on your country or state of residence, your investment may not be eligible for investor protection, hence it is advisable to conduct thorough research independently or seek appropriate guidance. While this website is accessible to you free of charge, please note that we may receive commissions from the companies featured on this site.

Disclosure: 18+ Rules regarding online gambling vary from country to country, please ensure you are following them and gamble responsibly. The content on this website is provided for entertainment purposes only. We may utilise affiliate links within our content, and receive commission.

Home/Crypto News
Crypto News

North Korean Lazarus Group Exploits Chrome to Target Crypto Users

Author
Austin Mwendia
Austin Mwendia
Crypto Writer
Fact Checked by Joshua Downes
Last updated: October 24, 2024
Cryptocurrency trading is speculative and your capital is at risk when you trade. We may earn affiliate commissions from some of the products on this page - at no extra cost to you.
TweetShareLinkedIn0
North Korean Lazarus Group Exploits Chrome to Target Crypto Users

Highlights:

  • Lazarus Group used a Chrome flaw to steal crypto, showing new levels of hacking expertise.
  • North Korean hackers lured victims with a fake game, exploiting a Chrome zero-day vulnerability.
  • Lazarus Group uses a Chinese trader to launder millions in stolen cryptocurrency.

North Korea’s Lazarus Group launched another cyberattack by using a fake blockchain game to exploit a zero-day vulnerability in Google’s Chrome browser. The attack, first spotted by Kaspersky Labs in May, allowed hackers to steal cryptocurrency wallet credentials. Google quickly addressed and fixed the flaw, but the damage had already been done. 

The vulnerability, identified as CVE-2024-4947, was in Chrome’s V8 JavaScript engine. Hackers exploited this flaw to execute malicious code. Lazarus exploited this zero-day bug to slip past defenses and gather sensitive information. Google fixed the issue within 12 days of Kaspersky’s report.

North Korean hackers, the Lazarus group, have exploited a Chrome zero-day vulnerability through a fake blockchain game, DeTankZone, to steal crypto wallet credentials. Just visiting the site can lead to infection! Stay vigilant and avoid unknown links. #CyberSecurity… pic.twitter.com/0GGE5uufHH

— CryptoniteUae (@CryptoniteUae) October 24, 2024

Kaspersky also detected another unknown vulnerability. This flaw lets attackers bypass Chrome’s security and gain full system access. Lazarus used this security gap to deploy additional malware on compromised systems. The group used their malware, Manuscrypt, to collect data before launching other malicious actions.

Fake Blockchain Game as a Trap

To carry out their plan, Lazarus Group created a fake play-to-earn game. The group called the game DeTankZone or DeTankWar, simulating a real-life blockchain-based game. The group posted the game across social media platforms like LinkedIn and X.

Users were infected simply by visiting the game’s website. This technique showed how easily Lazarus could target unsuspecting victims. The group carefully modeled the game after an existing platform called DeFiTankLand, fooling many into thinking it was a genuine project.

Microsoft Security had already flagged the game in February. However, when Kaspersky investigated, the hackers had removed the exploit code from the site. Still, Kaspersky reported the vulnerability to Google. The issue was fixed before the hackers could use it again.

Crypto Laundering Operation Linked to Lazarus

Lazarus has also been using a complex crypto-laundering operation. ZachXBT, a blockchain expert, uncovered a link between the group and Yicong Wang. The trader was a key player used to launder millions of dollars of stolen cryptocurrency.

1/ Meet Yicong Wang (王逸聪), a Chinese OTC trader who has helped Lazarus Group convert tens of millions of stolen crypto to cash from various hacks via bank transfers since 2022. pic.twitter.com/ARcwC7r3Xr

— ZachXBT (@zachxbt) October 23, 2024

Wang has been using pseudonyms such as Seawang and BestRhea977. He used the identities to convert stolen crypto into cash. The funds were moved using bank transfers, making it difficult to trace the transactions. 

Wang’s operations have further laundered $17 million from over 25 hack-associated cases involving Lazarus since 2022. In November 2023, 374,000 USDT from the address was frozen by Tether.. Despite the restriction, Wang found ways to move some funds through Tornado Cash. 

Sophisticated Social Engineering Techniques

The attack was mainly a social engineering campaign. Lazarus created a fake game with a professional-looking website. To promote it, they created several fake accounts on X and LinkedIn. They made the project look legitimate to the users by using AI-generated images and content. 

Lazarus Group uses advanced malware with well-crafted social engineering. Their latest campaign proves that they are not just relying on technical exploits. Instead, they are targeting their victims, using social connections and trust. This makes them one of the most dangerous cyber threat actors today.

Tags

Google ChromeLazarus GroupMoney LaunderingNorth Korean Hackers
Austin Mwendia
Author

Austin Mwendia

Austin Mwendia is a passionate crypto journalist with three years of experience. He has contributed to various media outlets, covering blockchain technology, market analysis, and financial trends. He is committed to educating readers and expanding the adoption of blockchain and decentralized finance.

View full profile ›

ℹ️About Crypto2Community's Editorial Process

Crypto2Community's editorial policy is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict editorial policy and sourcing standards, and each page undergoes diligent review by our team of top crypto industry experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.

More by this author:

  • Bitwise Files Second Amendment for Hyperliquid ETF, HYPE Price Climbs
  • CFTC Appoints Innovation Task Force Team to Oversee Crypto and AI Developments
  • Circle Explains USDC Freeze Limits After Drift Protocol Hack

Related Articles:

Bitwise Files Second Amendment for Hyperliquid ETF, HYPE Price Climbs
Bitwise Files Second Amendment for Hyperliquid ETF, HYPE Price Climbs
Crypto News5 hours ago
Syed Ali Haider
By Syed Ali Haider4/11/2026
CFTC Appoints Innovation Task Force Team to Oversee Crypto and AI Developments
CFTC Appoints Innovation Task Force Team to Oversee Crypto and AI Developments
Crypto News7 hours ago
Syed Ali Haider
By Syed Ali Haider4/11/2026
Circle Explains USDC Freeze Limits After Drift Protocol Hack
Circle Explains USDC Freeze Limits After Drift Protocol Hack
Crypto News19 hours ago
Chinedu Agbakwusi
By Chinedu Agbakwusi4/10/2026

Popular Topics

  • Sei Price Prediction 2025, 2030, 2040
  • Uniswap Price Prediction 2025, 2030, 2040
  • Near Protocol Price Prediction 2025, 2030, 2040
  • Loopring Price Prediction 2025, 2030, 2040
  • Chainlink Price Prediction 2025, 2030, 2040

Trending News

  • Bitwise Files Second Amendment for Hyperliquid ETF, HYPE Price Climbs
  • CFTC Appoints Innovation Task Force Team to Oversee Crypto and AI Developments
  • Circle Explains USDC Freeze Limits After Drift Protocol Hack
  • Aethir Halts Bridge Exploit, Caps Losses Below $90K
  • Ethereum Network Activity Hits All-Time High with 1.3M Transactions
  • Hong Kong Issues First Stablecoin Licences to HSBC and Standard Chartered Venture
  • Bitcoin Could Be Quantum Safe Without a Soft Fork, Analyst Says
  • Top Crypto Picks for Today, April 10 – Zcash, Hyperliquid, BNB
  • Japan Approves Bill to Treat Crypto as Financial Instruments
  • Coinbase CEO Backs Treasury Secretary’s Call to Pass the CLARITY Act
  • Hyperliquid Price Outlook – HYPE Gains Strength, $42.15 in Focus
  • Bitmine Uplists to NYSE with 4.8M ETH and a $4 Billion Buyback
  • Best Crypto Gainers Today, April 9 – SIREN, DEXE, JUST
  • Bitcoin Price Holds Near $71K as Iran BTC Toll Plan Raises Uncertainty
  • Bitcoin Depot Loses 50.9 BTC in Wallet Breach Revealed in SEC Filing
  • Ethereum Foundation Offloads 3,750 ETH Worth $8.3M
  • Stablecoin Volumes May Hit $1.5 Quadrillion by 2035: Chainalysis
  • Treasury Secretary Scott Bessent Calls CLARITY Act a National Priority
  • Canary Capital Seeks SEC Approval for Spot PEPE ETF
  • Iran Plans Bitcoin Toll for Laden Oil Tankers Crossing Strait of Hormuz