Lazarus (BlueNoroff) Abuses Chrome V8 Zero-Day (CVE-2024-4947) via Fake DeFi “DeTankZone” Game to Deliver Manuscrypt

1. Executive Summary

In a financially motivated campaign attributed to the Lazarus Group’s BlueNoroff ecosystem, attackers weaponised a Google Chrome zero-day in the V8 JavaScript engine to compromise victims who merely visited a convincing “DeFi/GameFi” website masquerading as a crypto-enabled tank game. According to Kaspersky’s technical analysis of the DeTankZone campaign, the malicious site triggered remote code execution within Chrome and culminated in the deployment of the long-running Lazarus backdoor family Manuscrypt. Google patched the issue as CVE-2024-4947 in Chrome 125, and stated it was aware of in-the-wild exploitation in its release notes (Google Chrome Stable Channel Update for Desktop (15 May 2024); NVD).

This activity is particularly relevant to cryptocurrency investors and organisations with exposure to digital-asset workflows, as the lure and post-exploitation objectives focus on wallet credentials and related sensitive data (Kaspersky press release summary; BleepingComputer coverage).

2. Contextual Background

2.1 Nature of the threat

The primary vulnerability disclosed is CVE-2024-4947, a V8 type confusion flaw enabling arbitrary code execution “inside a sandbox” via a crafted HTML page (Google Chrome Stable Channel Update for Desktop (15 May 2024); NVD). Government and national CERT-style advisories also highlighted active exploitation at the time (NHS England cyber alert CC-4494; CERT-EU advisory 2024-044).

Kaspersky reports the exploit chain was delivered through detankzone[.]com, presented as an NFT/DeFi-themed online tank game, where “visiting the website was all it took” to trigger exploitation and lead to system compromise (Kaspersky Securelist report).

2.2 Threat-actor attribution

Attribution is primarily based on Kaspersky’s assessment that the activity aligns with Lazarus APT and its BlueNoroff subgroup, including use of the Manuscrypt backdoor and campaign tradecraft (Kaspersky Securelist report). Lazarus is tracked in MITRE ATT&CK as G0032.

Because “BlueNoroff” is commonly discussed as part of Lazarus’ financially motivated operations, and some vendors map related activity to clusters such as APT38, it is useful to reference MITRE’s financial-operations-aligned North Korea grouping APT38 (G0082) for broader historical context. Confidence: Likely (A2) — the reporting is strong and vendor-led, but public artefacts in the sources provided do not claim absolute exclusivity of tooling to one single Lazarus sub-team (Kaspersky Securelist report; BleepingComputer coverage).

Microsoft also discussed overlapping campaign elements and North Korean clustering in its write-up of Moonstone Sleet, which Kaspersky references as partially revealing related findings and tracking of associated sites since February 2024 (Kaspersky Securelist report).

2.3 Sector and geographic targeting

Victimology and lures are aligned to cryptocurrency investors and related individuals/organisations globally, with Kaspersky describing targeted theft of wallet credentials and spyware installation (Kaspersky press release summary). Kaspersky’s case study began with detection on a system belonging to an individual in Russia, underscoring that the campaign can reach beyond traditional enterprise-only targeting (Kaspersky Securelist report).

3. Technical Analysis

3.1 Vulnerability and TTP overview (with ATT&CK mapping)

The initial access path leveraged social engineering and web-based exploitation: victims were enticed to a polished “crypto game” site that silently loaded an exploit from within the site’s codebase (Kaspersky Securelist report). This aligns with:

  • T1204.001 (User Execution: Malicious Link) — victims visit attacker-controlled content.
  • T1203 (Exploitation for Client Execution) — browser exploitation to gain code execution.
  • T1583.001 (Acquire Infrastructure: Domains) — attacker-owned domains hosted the lure and exploit delivery.

Kaspersky further observed that the lure included a seemingly legitimate Unity game download and referenced an API endpoint (api.detankzone[.]com) embedded in the game’s configuration (Kaspersky Securelist report). While the site itself could trigger compromise, the broader ecosystem reflects a deliberate effort to increase credibility and engagement.

3.2 Exploitation status (in the wild) and PoC considerations

Google explicitly stated it was aware of active exploitation for CVE-2024-4947 in its Chrome stable-channel release notes (Google Chrome Stable Channel Update for Desktop (15 May 2024)). National and regional advisories likewise flagged exploitation (NHS England cyber alert CC-4494; CERT-EU advisory 2024-044).

Kaspersky’s disclosure indicates the vulnerability was reported to Google on 13 May 2024 and a fix was issued in the Chrome 125 line shortly thereafter, with public reporting commonly pointing to Chrome 125.0.6422.60/.61 as the patched build (Kaspersky Securelist report; BleepingComputer coverage).

4. Impact Assessment

4.1 Severity and scope

CVE-2024-4947 is a high-severity Chrome/V8 issue that enables remote arbitrary code execution via crafted web content (NVD). In practical terms, successful exploitation can provide attackers a beachhead on user endpoints and enable follow-on malware delivery, credential theft, and persistence — particularly dangerous for high-value users with access to cryptocurrency wallets and sensitive browser-stored secrets (Kaspersky press release summary).

4.2 Victim profile

Observed targeting focuses on cryptocurrency investors and users likely to interact with DeFi/GameFi ecosystems (Kaspersky Securelist report). The campaign also demonstrates that “consumer” endpoints may be explicitly targeted when they represent high-value financial access (e.g., personal wallets, seed phrases, exchange logins).

5. Indicators of Compromise (IOCs)

5.1 IOC Table

TypeValueContext / NotesSource
Domaindetankzone[.]comPrimary lure/exploit site (fake DeFi/NFT tank game).Kaspersky Securelist report
Domainccwaterfall[.]comAssociated infrastructure linked to the campaign.Kaspersky Securelist report
Hash (MD5)B2DC7AEC2C6D2FFA28219AC288E4750CExploit artefact hash.Kaspersky Securelist report
Hash (SHA-1)E5DA4AB6366C5690DFD1BB386C7FE0C78F6ED54FExploit artefact hash.Kaspersky Securelist report
Hash (SHA-256)7353AB9670133468081305BD442F7691CF2F2C1136F09D9508400546C417833AExploit artefact hash.Kaspersky Securelist report
Hash (MD5)8312E556C4EEC999204368D69BA91BF4Game/lure archive hash.Kaspersky Securelist report
Hash (SHA-1)7F28AD5EE9966410B15CA85B7FACB70088A17C5FGame/lure archive hash.Kaspersky Securelist report
Hash (SHA-256)59A37D7D2BF4CFFE31407EDD286A811D9600B68FE757829E30DA4394AB65A4CCGame/lure archive hash.Kaspersky Securelist report

5.2 Detection guidance

  • Network controls: Block and retro-hunt for DNS/HTTP(S) access to detankzone[.]com and ccwaterfall[.]com, and review proxy logs for first-seen connections that align with the campaign timeframe discussed by Kaspersky (February–May 2024) (Kaspersky Securelist report).
  • Endpoint telemetry: Flag Chrome child-process anomalies following browsing sessions (especially immediate post-visit execution chains consistent with drive-by exploitation). Pair with alerting on the IOC hashes above where EDR supports file hash correlation (Kaspersky Securelist report).
  • Browser version hygiene: Identify endpoints running Chrome versions prior to the patched builds (Chrome 125.0.6422.60/.61) and prioritise remediation (Google Chrome Stable Channel Update for Desktop (15 May 2024); BleepingComputer coverage).

6. Incident Response Guidance

6.1 Containment, eradication, and recovery

  • Contain: Isolate suspected endpoints from the network; block known malicious domains and review egress policies to reduce direct-to-internet browser exposure for high-risk users.
  • Eradicate: Reimage or surgically remove confirmed malware with validated EDR tooling; rotate credentials and revoke active sessions for exchanges, wallets, password managers, and email accounts used on impacted hosts.
  • Recover: Restore from known-good backups; enforce browser auto-update and enterprise policy baselines (extensions allow-listing, reduced local admin, attack surface reduction).

6.2 Forensic artefacts to collect and preserve

  • Full disk image (or triage collection) and memory capture, especially if exploitation is suspected to have occurred via the browser.
  • Browser artefacts: Chrome profile directory, extension inventory, download history, cache, and “Last Session/Current Session” files.
  • Proxy/DNS logs for connections to campaign domains and related subdomains.
  • EDR process tree and script telemetry around the time the user visited the lure site.

6.3 Lessons learned

  • Assume “legitimate-looking” Web3/GameFi properties can be weaponised; treat crypto-adjacent marketing and community links as high-risk.
  • Adopt rapid browser patch SLAs and validate actual installed versions (not just update policies).

7. Threat Intelligence Contextualisation

7.1 Comparison with similar incidents

BlueNoroff-aligned activity has historically blended social engineering with malware tailored for financial theft. This campaign modernises that playbook by pairing a high-end browser exploit with a high-credibility lure (a functional Unity game) to reach victims who might otherwise avoid obvious phishing (Kaspersky Securelist report). It also overlaps with broader North Korean financially motivated activity clusters described by Microsoft (Microsoft’s Moonstone Sleet analysis).

7.2 ATT&CK mapping table

TacticTechnique IDTechnique NameObserved Behaviour
Resource DevelopmentT1583.001Acquire Infrastructure: DomainsAttacker-controlled domains hosted lure content and exploit delivery (e.g., detankzone[.]com).
Initial AccessT1204.001User Execution: Malicious LinkVictim visits a promoted “DeFi game” site; no further interaction required for exploitation.
ExecutionT1203Exploitation for Client ExecutionChrome exploit triggers code execution in the browser process via crafted web content.
CollectionT1005Data from Local SystemCampaign objective includes stealing wallet credentials and user data post-compromise.

Note: The collection objective is based on reported outcomes (spyware/wallet credential theft) rather than a fully enumerated public TTP chain in the sources above (Kaspersky press release summary).

8. Mitigation Recommendations

8.1 Hardening and best practices

  • Enforce rapid browser updates and validate compliance via endpoint management reporting.
  • Reduce exposure for high-risk users (crypto admins, finance staff, executives): isolate browsing, restrict untrusted web access, and use hardened browser profiles.
  • Domain/IP reputation controls: block newly registered or low-reputation domains for high-risk segments; apply SSL inspection where appropriate and lawful.

8.2 Patch management advice

9. Historical Context & Related Vulnerabilities

This campaign reinforces a recurring pattern: high-value financial targeting paired with advanced initial access methods. While Lazarus/BlueNoroff operations have historically leveraged phishing and bespoke malware, the DeTankZone activity shows willingness to spend and burn a browser zero-day for access to cryptocurrency-related targets (Kaspersky Securelist report).

Related vulnerability record: CVE-2024-4947 (NVD entry).

10. Future Outlook

Expect continued convergence of high-credibility lures (AI-assisted branding, functional software, community-building on social platforms) with client-side exploitation to defeat user scepticism and bypass traditional email-focused controls (Kaspersky Securelist report). Financially motivated North Korean operators are likely to keep investing in exploit chains that reduce the need for victim interaction—particularly when targeting individuals holding digital assets.

11. Further Reading