skip to Main Content
bitcoin
Bitcoin (BTC) $ 98,718.45 0.30%
ethereum
Ethereum (ETH) $ 3,345.58 0.74%
tether
Tether (USDT) $ 1.00 0.04%
solana
Solana (SOL) $ 257.65 1.86%
bnb
BNB (BNB) $ 645.25 1.40%
xrp
XRP (XRP) $ 1.55 10.51%
dogecoin
Dogecoin (DOGE) $ 0.443063 12.18%
cardano
Cardano (ADA) $ 1.08 23.74%
usd-coin
USDC (USDC) $ 1.00 0.06%
staked-ether
Lido Staked Ether (STETH) $ 3,344.12 0.77%

Massive supply chain attack targeting small number of crypto companies: Kaspersky

Crowdstrike and Kaspersky found an infection in a communications app that delivered a backdoor, but deployed it only a few times.

282 Total views

3 Total shares

Massive supply chain attack targeting small number of crypto companies: Kaspersky

Own this piece of history

Collect this article as an NFT

A supply chain attack installed a backdoor in computers around the world but has only been deployed in fewer than ten computers, cybersecurity company Kaspersky has reported. The deployments showed a particular interest in cyptocurrency companies, it added. 

Cybersecurity company Crowdstrike reported on March 29 that it has identified malicious activity on the 3CX softphone app 3CXDesktopApp. The app is marketed to corporate clients. The malicious activity detected included “beaconing to actor-controlled infrastructure, deployment of second-stage payloads, and, in a small number of cases, hands-on-keyboard activity.”

Kaspersky said it suspected the involvement of the North Korea-linked threat actor Labyrinth Chollima. 3CX said of the infection:

“This appears to have been a targeted attack from an Advanced Persistent Threat, perhaps even state sponsored, that ran a complex supply chain attack and picked who would be downloading the next stages of their malware.”

Kaspersky was already investigating a dynamic link library (DLL) found in one of the infected 3CXDesktopApp .exe file, it said. The DLL in question had been used to deliver the Gopuram backdoor, although it was not the only malicious payload deployed in the attack. Gopuram has been found to coexist with the AppleJeus backdoor attributed to the North Korean Lazarus group, Kaspersky added.

Related: North Korean hackers are pretending to be crypto VCs in new phishing scheme — Kaspersky

Infected 3CX software has been detected around the world, with highest infection figures in Brazil, Germany, Italy and France. Gopuram has been deployed in fewer than ten computers, however, in a display of “surgical precision,” Kaspersky said. It had found a Gopuram infection in a Southeast Asian cryptocurrency company in the past.

If you are looking for a comprehensive overview of the current #3CX supply chain attack, I created a diagram that shows the attack flow!I’ll update as soon as the analysis progresses. Stay tuned for the MacOS edition! #cybersecurity #infosec #supplychainattack #3CXpocalypse pic.twitter.com/ANVLCgExmU

— Thomas Roccia (@fr0gger_) March 31, 2023

The 3CX app is used by over 600,000 companies, including several major brands, Kapersky said, citing the maker. The infected app had DigiCert certification.

Magazine: 4 out of 10 NFT sales are fake: Learn to spot the signs of wash trading

Loading data ...
Comparison
View chart compare
View table compare
Back To Top