Critical infrastructure also hit by supply chain attack behind 3CX breach

Power lines

The X_Trader software supply chain attack that led to last month’s 3CX breach has also impacted at least several critical infrastructure organizations in the United States and Europe, according to Symantec’s Threat Hunter Team.

North Korean-backed threat group linked to the Trading Technologies and 3CX attacks used a trojanized installer for X_Trader software to deploy the VEILEDSIGNAL multi-stage modular backdoor onto victims’ systems.

Once installed, the malware could execute malicious shellcode or inject a communication module into Chrome, Firefox, or Edge processes running on compromised systems.

“Initial investigation by Symantec’s Threat Hunter Team has, to date, found that among the victims are two critical infrastructure organizations in the energy sector, one in the U.S. and the other in Europe,” the company said in a report published today.

“In addition to this, two other organizations involved in financial trading were also breached.”

While the Trading Technologies supply chain compromise is the result of a financially motivated campaign, the breach of multiple critical infrastructure organizations is worrisome, seeing that North Korean-backed hacking groups are also known for cyber espionage.

It’s very likely that strategic organizations compromised as part of this supply chain attack will also be singled out for subsequent exploitation.

While Symantec didn’t name the two energy sector organizations, Symantec Threat Hunter Team Director of Security Response Eric Chien told BleepingComputer that they are “power suppliers generating and supplying energy to the grid.”

Wide-ranging supply chain attack

Having breached at least four more entities besides 3CX with the help of the trojanized X_Trader software, it’s also highly likely that the North Korean hacking campaign already impacted additional victims yet to be discovered.

“The discovery that 3CX was breached by another, earlier supply chain attack made it highly likely that further organizations would be impacted by this campaign, which now transpires to be far more wide-ranging than originally believed,” Symantec added.

“The attackers behind these breaches clearly have a successful template for software supply chain attacks and further, similar attacks cannot be ruled out.”

On Thursday, Mandiant linked a North Korean threat group it tracks as UNC4736 to the cascading supply chain attack that hit VoIP company 3CX in March.

UNC4736 is related to the financially motivated North Korean-sponsored Lazarus Group behind Operation AppleJeus [1, 2, 3], previously linked by Google’s Threat Analysis Group (TAG) to the compromise of Trading Technologies’ website.

Based on attack infrastructure overlap, Mandiant also connected UNC4736 with two APT43 malicious activity clusters tracked as UNC3782 and UNC4469.


Original Source


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

Buy Me A Coffee
Patreon

 To keep up to date follow us on the below channels.

join
Telegram
discord
Discord
reddit
Reddit
linkedin
LinkedIn