• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cryptocurrency companies targeted in sophisticated 3cx supply chain attack

Cryptocurrency Companies Targeted in Sophisticated 3CX Supply Chain Attack

You are here: Home / General Cyber Security News / Cryptocurrency Companies Targeted in Sophisticated 3CX Supply Chain Attack
April 4, 2023

The adversary powering the provide chain attack targeting 3CX deployed a second-stage implant precisely singling out a little selection of cryptocurrency corporations.

Russian cybersecurity business Kaspersky, which has been internally tracking the flexible backdoor less than the name Gopuram since 2020, said it noticed an boost in the selection of bacterial infections in March 2023 coinciding with the 3CX breach.

Gopuram’s major purpose is to hook up to a command-and-regulate (C2) server and await more recommendations that allow for the attackers to interact with the victim’s file process, make procedures, and launch as a lot of as eight in-memory modules.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The backdoor’s inbound links to North Korea stem from the truth that it “co-existed on target devices with AppleJeus, a backdoor attributed to the Korean-speaking threat actor Lazarus,” detailing an attack on an unnamed crypto business found in Southeast Asia in 2020.

The focusing on of cryptocurrency organizations is another telltale indication of the Lazarus Group’s involvement, offered the threat actor’s recurring emphasis on the financial market to crank out illicit revenue for the sanctions-hit nation.

Kaspersky additional reported it identified a C2 overlap with a server (“wirexpro[.]com”) that was beforehand determined as used in an AppleJeus campaign documented by Malwarebytes in December 2022.

“As the Gopuram backdoor has been deployed to significantly less than 10 infected equipment, it suggests that attackers employed Gopuram with surgical precision,” the business pointed out, including the greatest an infection rates have been detected in Brazil, Germany, Italy, and France.

Whilst the attack chain found so considerably involves the use of rogue installers to distribute an information stealer (identified as Legendary Stealer), the hottest results advise that the final purpose of the marketing campaign may have been to infect targets with the full-fledged modular backdoor.

That claimed, it is really not identified how thriving the marketing campaign has been, and if it has led to the genuine theft of delicate data or cryptocurrency. It, nonetheless, raises the likelihood that Legendary Stealer was used as a reconnaissance utility to forged a vast net and detect targets of interest for stick to-on exploitation.

The enhancement arrives as BlackBerry discovered that “the original phase of this procedure took area somewhere involving the close of summer and the beginning of slide 2022.”

A majority of the attack tries, for each the Canadian corporation, have been registered in Australia, the U.S., and the U.K., with healthcare, pharma, IT, and finance rising as the best targeted sectors.

It is really currently unclear how the risk actor received original accessibility to the 3CX network, and if it entailed the exploitation of a acknowledged or mysterious vulnerability. The compromise is getting tracked below the identifier CVE-2023-29059.

THN WEBINARBecome an Incident Reaction Pro!

Unlock the strategies to bulletproof incident response – Master the 6-Section process with Asaf Perlman, Cynet’s IR Leader!

You should not Pass up Out – Save Your Seat!

Proof collected to date suggests that the attackers poisoned 3CX’s improvement surroundings and sent trojanized variations of the legitimate app to the company’s downstream consumers in a SolarWinds or Kaseya-like offer chain attack.

One of the malicious elements dependable for retrieving the information-stealer, a library named “d3dcompiler_47.dll,” has also been noticed weaponizing a 10-year-old Windows flaw (CVE-2013-3900) to incorporate encrypted shellcode with out invalidating its Microsoft-issued signature.

A issue truly worth noting below is that the exact system was adopted by a ZLoader malware campaign unearthed by Israeli cybersecurity agency Look at Level Investigation in January 2022.

Multiple versions of the desktop app – 18.12.407 and 18.12.416 for Windows and 18.11.1213, 18.12.402, 18.12.407, and 18.12.416 for macOS – have been impacted. 3CX has due to the fact pinned the attack on a “really skilled and knowledgeable hacker.”

CrowdStrike has tied the incident to a North Korea-aligned nation-condition group it tracks underneath the moniker Labyrinth Chollima, a sub-cluster in the Lazarus Group.

Identified this short article fascinating? Adhere to us on Twitter  and LinkedIn to study extra unique content we post.


Some parts of this short article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News US DoD Unveils Website For Hack the Pentagon Bug Bounty Program
Next Post: Microsoft Tightens OneNote Security by Auto-Blocking 120 Risky File Extensions microsoft tightens onenote security by auto blocking 120 risky file extensions»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Enzo Biochem Hit by Ransomware, 2.5 Million Patients’ Data Compromised
  • US and Korean Agencies Issue Warning on North Korean Cyber-Attacks
  • Malicious PyPI Packages Use Compiled Python Code to Bypass Detection
  • New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
  • The Importance of Managing Your Data Security Posture
  • Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering
  • Insurers Predict $33bn Bill for Catastrophic “Cyber Event”
  • Chinese Phishing Gang “PostalFurious” Expands Campaign
  • Kaspersky Says it is Being Targeted By Zero-Click Exploits
  • North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks

Copyright © TheCyberSecurity.News, All Rights Reserved.