Boris Larin

Boris is a renowned expert in the fields of threat hunting and software reverse engineering. He works as a Principal Security Researcher in GReAT at Kaspersky. He has discovered and investigated a number of high-profile APT attacks (e.g. Operation Triangulation - the famous attack on iOS devices) and reported two dozen zero-day exploits. While working at Kaspersky, Boris has presented his work at a large number of conferences: CanSecWest, SAS, BlueHat, TyphoonCon, CodeBlue, Chaos Communication Congress, OffensiveCon, and many others.


Session

06-25
16:45
60min
The Crypto Game of North Korea: Stealing Money with Chrome 0-days
Boris Larin

In May 2024, we discovered a sophisticated malware campaign by North Korean hackers that exploited zero-day vulnerabilities in Google Chrome to attack companies and individuals associated with the cryptocurrency industry. In short, the attackers plan was to lure the victims from the targeted group to a malicious website, silently attack their web browsers, install malware, and ultimately steal personal information and money. North Korean hackers are known to use this style of targeted attacks, they have carried out a couple of similar campaigns in the past, but their methods are constantly improving and they are always coming up with something new that sometimes really impresses us. So, for this campaign, they developed a very elegant and reliable Google Chrome exploit that allowed them to achieve RCE and break out of the V8 sandbox using a chain of two logical vulnerabilities. What's more, this time the attackers came up with a crazy social engineering tactic to lure victims to the malicious site - they built their own online game and used it as bait, promoting it for months through social media!

Defense & Management
Track 1