Massive supply chain attack targeting small number of crypto companies: Kaspersky

2 years ago

Crowdstrike and Kaspersky recovered an corruption successful a communications app that delivered a backdoor, but deployed it lone a fewer times.

 Kaspersky

Own this portion of past

Collect this nonfiction arsenic an NFT

A proviso concatenation onslaught installed a backdoor successful computers astir the satellite but has lone been deployed successful less than 10 computers, cybersecurity institution Kaspersky has reported. The deployments showed a peculiar involvement successful cyptocurrency companies, it added. 

Cybersecurity institution Crowdstrike reported connected March 29 that it has identified malicious enactment connected the 3CX softphone app 3CXDesktopApp. The app is marketed to firm clients. The malicious enactment detected included “beaconing to actor-controlled infrastructure, deployment of second-stage payloads, and, successful a tiny fig of cases, hands-on-keyboard activity.”

Kaspersky said it suspected the engagement of the North Korea-linked menace histrion Labyrinth Chollima. 3CX said of the infection:

“This appears to person been a targeted onslaught from an Advanced Persistent Threat, possibly adjacent authorities sponsored, that ran a analyzable proviso concatenation onslaught and picked who would beryllium downloading the adjacent stages of their malware.”

Kaspersky was already investigating a dynamic nexus room (DLL) recovered successful 1 of the infected 3CXDesktopApp .exe file, it said. The DLL successful question had been utilized to present the Gopuram backdoor, though it was not the lone malicious payload deployed successful the attack. Gopuram has been recovered to coexist with the AppleJeus backdoor attributed to the North Korean Lazarus group, Kaspersky added.

Related: North Korean hackers are pretending to beryllium crypto VCs successful caller phishing strategy — Kaspersky

Infected 3CX bundle has been detected astir the world, with highest corruption figures successful Brazil, Germany, Italy and France. Gopuram has been deployed successful less than 10 computers, however, successful a show of “surgical precision,” Kaspersky said. It had found a Gopuram corruption successful a Southeast Asian cryptocurrency institution successful the past.

If you are looking for a broad overview of the existent #3CX proviso concatenation attack, I created a diagram that shows the onslaught flow!I'll update arsenic soon arsenic the investigation progresses. Stay tuned for the MacOS edition! #cybersecurity #infosec #supplychainattack #3CXpocalypse pic.twitter.com/ANVLCgExmU

— Thomas Roccia (@fr0gger_) March 31, 2023

The 3CX app is utilized by implicit 600,000 companies, including respective large brands, Kapersky said, citing the maker. The infected app had DigiCert certification.

Magazine: 4 retired of 10 NFT income are fake: Learn to spot the signs of lavation trading

View source