Connect with us

Hi, what are you looking for?

[stock_market_widget type="ticker-quotes" template="chart" color="#5679FF" assets="MSFT,AAPL,NFLX,GOOG,TSLA,NFLX,AMZN" animation="true" display_currency_symbol="true" api="yf" speed="50" direction="left" pause="true"]

Tech

3CX blames North Korea for supply chain mass-hack

Enterprise phone provider 3CX has confirmed that North Korea–backed hackers were behind last month’s supply chain attack that appeared to target cryptocurrency companies. 3CX, which provides online voice, video conferencing and messaging services for businesses, worked with cybersecurity company Mandiant to investigate the attack. Hackers compromised the company’s desktop phone software used by hundreds of

3cx-blames-north-korea-for-supply-chain-mass-hack

Enterprise phone provider 3CX has confirmed that North Korea–backed hackers were behind last month’s supply chain attack that appeared to target cryptocurrency companies.

3CX, which provides online voice, video conferencing and messaging services for businesses, worked with cybersecurity company Mandiant to investigate the attack. Hackers compromised the company’s desktop phone software used by hundreds of thousands of organizations to plant information-stealing malware inside their customers’ corporate networks.

Pierre Jourdan, chief information security officer at 3CX, said on Tuesday that their investigation confirms that hackers linked to the North Korean regime were behind the attack.

“Based on the Mandiant investigation into the 3CX intrusion and supply chain attack thus far, they attribute the activity to a cluster named UNC4736,” Jourdan said. “Mandiant assesses with high confidence that UNC4736 has a North Korean nexus.”

Cybersecurity giant CrowdStrike last week linked the 3CX breach to hackers it calls Labyrinth Chollima, a subunit of the notorious Lazarus Group, which is known for stealthy hacks targeting cryptocurrency exchanges to fund its nuclear weapons program. Russia-based Kaspersky Lab also attributed the 3CX breach to North Korea.

Kaspersky said in its analysis of the attack that the hackers were seen deploying a backdoor, which it has named “Gopuram,” onto infected systems, noting that the attackers have “a specific interest in cryptocurrency companies.” Kaspersky added that Gopuram was deployed on less than ten machines, indicating that the attackers used this backdoor with “surgical precision.”

In a forum post last week, 3CX CEO Nick Galea said that the company is only aware of “a handful of cases” where malware has been triggered. However, the impact of the attack, along with how 3CX was compromised, remains unknown. The company claims to have over 600,000 business customers worldwide and more than 12 million active daily users.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Mining

NAL spodumene concentrate production remains targeted for H1 2023 with revenue potential in Q3 2023. Credit: Piedmont Piedmont Lithium (Nasdaq: PLL; ASX: PLL) announced...

Stocks

SAN FRANCISCO (MarketWatch) — Among the companies whose shares are expected to see active trade in Thursday’s session are BlackBerry Ltd., Oracle Corp., and...

Tech

Over 90% of cybercrime activities that lead to financial fraud or identity theft start with an email impersonation, commonly known as phishing and spoofing....

Top Stories

Following a down year for the stock market, there is no shortage of recession predictions for 2023, especially as the Federal Reserve has signaled...

Advertisement