Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Tiktok now allows users to send voice memos and images via DMS

August 29, 2025

WhatsApp fixes a “zero click” bug used to hack Apple users with spyware

August 29, 2025

A sign of “t”? It's a lot of dollars, nvidia

August 29, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Tiktok now allows users to send voice memos and images via DMS

    August 29, 2025

    Mississippi's Age Guarantee Act Tests Decentralized Social Networks

    August 28, 2025

    Threads test how to share long format text on the platform

    August 28, 2025

    New AI features in WhatsApp allow you to rearrange and adjust the tone of your message

    August 27, 2025

    Google and Grok are catching up to ChatGpt, says the latest AI report from A16Z

    August 27, 2025
  • Crypto

    Coinbase CEO explains why he fired an engineer who didn't try AI right away

    August 22, 2025

    Your next customer is destroying the 2025 Expo floor

    August 19, 2025

    Crypto Company Gemini File for Winklevoss Twins IPO

    August 16, 2025

    North Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says

    August 4, 2025

    Telegram's Crypto Wallet will be released in the US

    July 22, 2025
  • Security

    WhatsApp fixes a “zero click” bug used to hack Apple users with spyware

    August 29, 2025

    According to Transunion, hackers say they stole the personal information of 4.4 million customers

    August 28, 2025

    The FBI says that China's salt typhoon has hacked at least 200 US companies

    August 27, 2025

    US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

    August 27, 2025

    Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

    August 26, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    A sign of “t”? It's a lot of dollars, nvidia

    August 29, 2025

    A comprehensive list of 2025 tech layoffs

    August 29, 2025

    Apply to host a side event that hinders you in 2025

    August 29, 2025

    Do you hire AI, or are you a human being? Next frontier for Startup Ops in 2025

    August 28, 2025

    From streaming to healthcare to AI, Mark Cuba reveals his “formula of confusion”

    August 27, 2025
TechBrunchTechBrunch

North Korean hackers exploit Chrome zero-day vulnerability to steal crypto assets

TechBrunchBy TechBrunchAugust 30, 20243 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


According to Microsoft, a North Korean hacking group exploited a previously unknown bug in Chrome to target organizations in early August with the aim of stealing cryptocurrency.

In a report published on Friday, cybersecurity researchers at the tech giant said they first saw evidence of the hackers' activity on Aug. 19 and that the hackers were linked to a group known as “Citrine Sleet,” which is known for targeting the cryptocurrency industry.

According to the report, the hackers exploited a flaw in a core engine within Chromium, the underlying code for popular browsers like Chrome and Microsoft Edge. At the time the hackers exploited the vulnerability, it was a zero-day vulnerability, meaning the software maker (in this case, Google) was unaware of the bug and didn't have time to issue a fix before it was exploited. Google fixed the bug two days later, on August 21, according to Microsoft.

Google spokesman Scott Westover told TechCrunch that the company had no comment other than to confirm that the bug had been fixed.

Microsoft said it had notified “those customers who were targeted and compromised,” but did not provide details about who was targeted or how many targets and victims were involved in the hacking campaign.

Contact Us Do you have more information about North Korean government hackers or other government-sponsored hacking activities? You can securely contact Lorenzo Franceschi-Bicchierai from a non-work device via Signal (+1 917 257 1382), Telegram, Keybase @lorenzofb, or email. You can also contact TechCrunch via SecureDrop.

When asked by TechCrunch, Microsoft spokesperson Chris Williams declined to say how many organizations or companies were affected.

The researchers said Citrin Sleet is “based in North Korea and primarily targets financial institutions, particularly organizations and individuals who control cryptocurrencies, for financial gain,” adding that the group has “done extensive reconnaissance on the cryptocurrency industry and individuals associated with it” as part of its social engineering techniques.

“Threat actors create fake websites posing as legitimate cryptocurrency trading platforms and use them to distribute fake job postings or lure targets into downloading weaponized cryptocurrency wallets and trading applications based on legitimate applications,” the report states. “Citrine Sleet most commonly infects targets with its custom-developed Trojan malware, AppleJeus, to gather information needed to seize control of the victim's cryptocurrency assets.”

The North Korean hackers' attacks began by tricking victims into visiting web domains they controlled, then exploiting another vulnerability in the Windows kernel that allowed them to install a rootkit – a type of malware that gives deep access to the operating system – on the targeted computers, the Microsoft report said.

At that point, the hacker has complete control over the hacked computer, and it's essentially game over when it comes to the targeted victim's data.

Cryptocurrencies have long been an attractive target for North Korean government hackers, with a United Nations Security Council committee concluding that the regime stole $3 billion worth of cryptocurrencies between 2017 and 2023. With Kim Jong Un's regime subject to strict international sanctions, the regime has turned to cryptocurrencies to fund its nuclear weapons program.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

WhatsApp fixes a “zero click” bug used to hack Apple users with spyware

August 29, 2025

According to Transunion, hackers say they stole the personal information of 4.4 million customers

August 28, 2025

The FBI says that China's salt typhoon has hacked at least 200 US companies

August 27, 2025

US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

August 27, 2025

Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

August 26, 2025

Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

August 26, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Tiktok now allows users to send voice memos and images via DMS

August 29, 2025

WhatsApp fixes a “zero click” bug used to hack Apple users with spyware

August 29, 2025

A sign of “t”? It's a lot of dollars, nvidia

August 29, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.