{"id":19551,"date":"2022-04-20T15:12:26","date_gmt":"2022-04-20T11:12:26","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/lazarus-defi-wallet-backdoor\/19551\/"},"modified":"2022-04-20T15:12:26","modified_gmt":"2022-04-20T11:12:26","slug":"lazarus-defi-wallet-backdoor","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/lazarus-defi-wallet-backdoor\/19551\/","title":{"rendered":"Lazarus backdoor in DeFi wallet"},"content":{"rendered":"<p>In mid-December last year, a suspicious file was uploaded to VirusTotal \u2014 the online service that scans files for malware. At first glance, it looked like a cryptocurrency wallet installer. But our experts <a href=\"https:\/\/securelist.com\/lazarus-trojanized-defi-app\/106195\/\" target=\"_blank\" rel=\"nofollow noopener\">analyzed it<\/a> and found that, besides the wallet, it delivers malware to a user\u2019s device. And it seems that the program isn\u2019t the work of small-time crooks \u2014 but the infamous cybercriminals behind <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/lazarus\/\" target=\"_blank\" rel=\"noopener nofollow\">Lazarus<\/a>.<\/p>\n<h2>What is Lazarus?<\/h2>\n<p>Lazarus is an <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/apt-advanced-persistent-threats\/\" target=\"_blank\" rel=\"noopener\">APT group<\/a>. Such groups are cybercriminal organizations that are typically well-funded, develop complex malware, and specialize in <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/targeted-attack\/\" target=\"_blank\" rel=\"noopener\">targeted attacks<\/a> \u2014 for example for industrial or political espionage. Stealing money, if it interests them at all, is not usually their primary goal.<\/p>\n<p>Lazarus, however, is an APT group that actively goes after other people\u2019s money. In 2016, for example, the group <a href=\"https:\/\/www.kaspersky.com\/blog\/lazarus-modus-operandi-and-countermeasures\/6716\/\" target=\"_blank\" rel=\"noopener nofollow\">made off with a tidy sum<\/a> from the Central Bank of Bangladesh; in 2018 it <a href=\"https:\/\/www.kaspersky.com\/blog\/lazarus-crypto-exchange-attack\/23610\/\" target=\"_blank\" rel=\"noopener nofollow\">infected a cryptocurrency exchange<\/a> with malware; and in 2020 it tried its hand at <a href=\"https:\/\/www.kaspersky.com\/blog\/lazarus-vhd-ransomware\/36559\/\" target=\"_blank\" rel=\"noopener nofollow\">ransomware<\/a>.<\/p>\n<h2>DeFi wallet with backdoor<\/h2>\n<p>The file that caught our researchers\u2019 collective eye contained an infected installer for a legitimate decentralized crypto wallet. DeFi (decentralized finance) is a financial model in which there are no intermediaries like banks, and all transactions are made directly between users. In recent years, DeFi technology has been gaining popularity. According to Forbes, for instance, from May 2020 to May 2021 the value of assets placed in DeFi systems <a href=\"https:\/\/www.forbes.com\/sites\/lawrencewintermeyer\/2021\/05\/20\/after-growing-88x-in-a-year-where-does-defi-go-from-here\/\" target=\"_blank\" rel=\"nofollow noopener\">increased by 88 times<\/a>. Not surprisingly then, DeFi is attracting cybercriminal interest.<\/p>\n<p>How exactly cybercriminals persuade victims to download and run the infected file is not entirely clear. However, our experts suppose that attackers send users <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/spear-phishing\/\" target=\"_blank\" rel=\"noopener\">targeted e-mails<\/a> or messages in social media. Unlike mass mailings, such messages are tailored to a specific recipient and can look very plausible.<\/p>\n<p>In any case, when the user runs the installer, it creates two executables: one \u2014 a malicious program, the other \u2014 a clean crypto wallet installer. The malware masks itself as the Google Chrome browser and tries to hide the existence of the infected installer by copying a clean installer in its place, which it runs immediately so that the user doesn\u2019t suspect anything. Once the wallet is successfully installed, the malware continues to run in the background.<\/p>\n<h2>How dangerous is it?<\/h2>\n<p>The malware that gets slipped onto the computer with the DeFi wallet is a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/backdoor\/\" target=\"_blank\" rel=\"noopener\">backdoor<\/a>. Depending on the operator\u2019s intentions, the backdoor can either harvest information or provide remote control over the device. Specifically, it can:<\/p>\n<ul>\n<li>Start and terminate processes;<\/li>\n<li>Execute commands on the device;<\/li>\n<li>Download files to the device, delete them, and send files from the device to the C&amp;C server.<\/li>\n<\/ul>\n<p>In other words, in case of a successful attack, the malware can disable the antivirus and steal whatever it likes \u2014 from valuable documents to accounts and money. It can also download other malicious programs to the computer as the cybercriminals see fit. As ever, more details are available in the <a href=\"https:\/\/securelist.com\/lazarus-trojanized-defi-app\/106195\/\" target=\"_blank\" rel=\"nofollow noopener\">technical breakdown of the Trojan<\/a> on our expert blog Securelist.<\/p>\n<h2>How not to fall victim<\/h2>\n<p>If you handle finances, and especially cryptocurrency, be wary of messages that try to persuade you to install programs from untrusted sources. In addition, <a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">make sure your devices are secure<\/a> \u2014 in particular those you use for cryptocurrency transactions. A reliable security solution will help in cases when simple attentiveness isn\u2019t enough.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-banking\">\n","protected":false},"excerpt":{"rendered":"<p>The Lazarus group continues to prey on cryptocurrency: cybercriminals distribute DeFi wallets with built-in backdoor.<\/p>\n","protected":false},"author":2477,"featured_media":19552,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[477,1520,1505,2553,1702,692],"class_list":{"0":"post-19551","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-apt","9":"tag-backdoors","10":"tag-cryptocurrencies","11":"tag-defi","12":"tag-lazarus","13":"tag-trojans"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/lazarus-defi-wallet-backdoor\/19551\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/lazarus-defi-wallet-backdoor\/24065\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/lazarus-defi-wallet-backdoor\/9884\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/lazarus-defi-wallet-backdoor\/26392\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/lazarus-defi-wallet-backdoor\/24339\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/lazarus-defi-wallet-backdoor\/24698\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/lazarus-defi-wallet-backdoor\/27104\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/lazarus-defi-wallet-backdoor\/33072\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/lazarus-defi-wallet-backdoor\/10645\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/lazarus-defi-wallet-backdoor\/44138\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/lazarus-defi-wallet-backdoor\/18806\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/lazarus-defi-wallet-backdoor\/19336\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/lazarus-defi-wallet-backdoor\/15938\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/lazarus-defi-wallet-backdoor\/28504\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/lazarus-defi-wallet-backdoor\/24960\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/lazarus-defi-wallet-backdoor\/30416\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/lazarus-defi-wallet-backdoor\/30184\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2477"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=19551"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19551\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/19552"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=19551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=19551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=19551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}