bitcoin
bitcoin

$96776.68 USD 

-1.03%

ethereum
ethereum

$3337.45 USD 

-2.05%

tether
tether

$1.00 USD 

-0.06%

solana
solana

$250.47 USD 

-1.78%

bnb
bnb

$655.91 USD 

1.08%

xrp
xrp

$1.41 USD 

-2.67%

dogecoin
dogecoin

$0.423544 USD 

-0.25%

usd-coin
usd-coin

$0.999963 USD 

0.00%

cardano
cardano

$1.00 USD 

-4.28%

tron
tron

$0.206568 USD 

-2.16%

stellar
stellar

$0.572838 USD 

17.40%

avalanche
avalanche

$40.54 USD 

-1.85%

toncoin
toncoin

$6.10 USD 

-2.53%

shiba-inu
shiba-inu

$0.000025 USD 

-1.65%

polkadot-new
polkadot-new

$8.75 USD 

3.00%

加密貨幣新聞文章

Lazarus 加密貨幣駭客組織在網路上重新浮出水面

2024/10/24 17:09

Lazarus Group 是一個臭名昭著的駭客組織,由數量不詳的人員組成,據稱由北韓政府經營

Lazarus 加密貨幣駭客組織在網路上重新浮出水面

The Lazarus Group, a state-sponsored North Korean hacker group, has resurfaced after months of silence. In its latest attack, the group used a fake, non-fungible token (NFT)-based game on Google Chrome to install spyware that stole crypto and NFT wallet credentials.

由北韓國家資助的駭客組織拉撒路集團 (Lazarus Group) 在沉寂數月後重新浮出水面。在最新的攻擊中,該組織在 Google Chrome 上使用虛假的、基於不可替代代幣 (NFT) 的遊戲來安裝竊取加密貨幣和 NFT 錢包憑證的間諜軟體。

According to an Oct. 24 blog post by Cointelegraph, the Lazarus hacker group has resurfaced online after several months "underwater." The group began by launching a fake NFT game on Chrome that installed spyware designed to pilfer sensitive data from crypto users engaging with the fake game.

根據 Cointelegraph 10 月 24 日的一篇部落格文章,Lazarus 駭客組織在「水下」幾個月後重新出現在網路上。該組織首先在 Chrome 上推出一款虛假 NFT 遊戲,該遊戲安裝了間諜軟體,旨在竊取參與虛假遊戲的加密貨幣用戶的敏感資料。

The #NorthKorean #Lazarus hacking group exploited a Google Chrome zero-day tracked as CVE-2024-4947 through a fake decentralized finance (DeFi) game targeting individuals in the cryptocurrency space. #Hacking #cybersecurityhttps://t.co/wMBJUipAq4

#NorthKorean #Lazarus 駭客組織透過針對加密貨幣領域個人的虛假去中心化金融 (DeFi) 遊戲,利用了追蹤為 CVE-2024-4947 的 Google Chrome 零日漏洞。 #駭客#網路安全https://t.co/wMBJUipAq4

— Anonymous🐾🐈‍⬛ (@YourAnonRiots) October 23, 2024

- 匿名🐾🐈‍⬛ (@YourAnonRiots) 2024 年 10 月 23 日

The Lazarus Group is a North Korean state-sponsored cyber threat group linked to the North Korean Reconnaissance General Bureau (RGB). The NKRGB is tasked with espionage, covert operations and cyber activities. Throughout its existence, the RGB has dedicated significant efforts to gathering intelligence and attempting to infiltrate crypto funds in South Korea, the United States and Japan.

Lazarus Group 是北韓國家支持的網路威脅組織,與北韓偵察總局 (RGB) 有聯繫。 NKRGB 的任務是從事間諜活動、秘密行動和網路活動。自成立以來,RGB 一直致力於收集情報並試圖滲透韓國、美國和日本的加密貨幣基金。

The Lazarus Group gained notoriety in 2021 when it was officially named by the Federal Bureau of Investigation (FBI) as the perpetrator of a breach on Sky Mavis, the developer of the popular blockchain-based video game Axie Infinity, which resulted in the theft of digital assets worth hundreds of millions of dollars. As of December 2023, North Korean hackers had stolen over $3 billion in crypto heists.

Lazarus 集團於 2021 年被美國聯邦調查局 (FBI) 正式認定為對流行的區塊鏈視訊遊戲 Axie Infinity 的開發商 Sky Mavis 進行資料外洩事件的肇事者,該事件導致其被盜。的數位資產。截至 2023 年 12 月,北韓駭客透過加密貨幣竊盜竊取了超過 30 億美元。

The Lazarus hacker group strikes again in 2024

Lazarus駭客組織2024年再次發動攻擊

The exploit was noticed by Kaspersky Labs analysts in May and reported to Google, which fixed it several days later, as per the Cointelegraph report. The hackers launched a play-to-earn multiplayer online battle arena (MOBA) game and advertised it on LinkedIn and X. The game, which was a DeTankZone knockoff, featured NFTs used as tanks in a global competition. The fake NFT game was initially discovered and flagged by the Microsoft Security Team in February 2024.

據 Cointelegraph 報導,卡巴斯基實驗室分析師在 5 月注意到了該漏洞,並向谷歌報告,谷歌在幾天後修復了漏洞。駭客推出了一款透過玩來賺錢的多人線上競技場(MOBA) 遊戲,並在LinkedIn 和X 上進行了廣告。坦克。這款仿冒 NFT 遊戲最初由微軟安全團隊於 2024 年 2 月發現並標記。

Screenshot from Lazarus Group’s fake game. Source: SecureList

Lazarus Group 假遊戲的螢幕截圖。來源:SecureList

However, by the time Kaspersky planned to analyze the exploit, the North Korean hackers had already removed it from the website. Regardless, the Kaspersky Labs analysts notified Google about it, and Google patched the vulnerability in Chrome before the hackers could reuse the exploit.

然而,當卡巴斯基計劃分析該漏洞時,北韓駭客已將其從網站上刪除。不管怎樣,卡巴斯基實驗室的分析師將此事通知了谷歌,谷歌在駭客重新利用漏洞之前修補了 Chrome 中的漏洞。

In the meantime, the total number of victims affected by this breach remains unknown. Users who previously interacted with the game are advised to reset all their passwords.

同時,受此漏洞影響的受害者總數仍不清楚。建議之前接觸過遊戲的用戶重置所有密碼。

Related NFT News:

相關 NFT 新聞:

新聞來源:insidebitcoins.com

免責聲明:info@kdj.com

所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!

如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。

2024年11月25日 其他文章發表於