Massive supply chain attack targets 3CX users with Trojanized apps.

TL;DR Summary
North Korean hackers have carried out a massive supply chain attack on Windows and macOS users of 3CX, a widely used voice and video calling desktop client, compromising the software build system used to create and distribute Windows and macOS versions of the app. The attackers were able to hide malware inside 3CX apps that were digitally signed using the company’s official signing key. The attack is reminiscent of the SolarWinds supply chain attack detected in December 2020. Any organization that uses 3CX should immediately begin analyzing its network infrastructure to look for signs of compromise.
Topics:technology#3cx#cybersecurity#malware#north-korean-hackers#supply-chain-attack#windows-and-macos
- Trojanized Windows and Mac apps rain down on 3CX users in massive supply chain attack Ars Technica
- Hackers compromise 3CX desktop app in a supply chain attack BleepingComputer
- SmoothOperator | Ongoing Campaign Trojanizes 3CXDesktopApp in Supply Chain Attack SentinelOne
- CrowdStrike Prevents 3CXDesktopApp Intrusion Campaign CrowdStrike
- There’s a new supply chain attack targeting customers of a phone system with 12 million users TechCrunch
Reading Insights
Total Reads
0
Unique Readers
1
Time Saved
4 min
vs 5 min read
Condensed
89%
894 → 96 words
Want the full story? Read the original article
Read on Ars Technica