Close Menu
New York Examiner News

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Rocky Kramer’s Rock & Roll Tuesdays Presents “Memorial Rock” On Tuesday, May 26th, 2026 7 PM PT on Twitch

    May 24, 2026

    I Am a Proudly Gay Man

    May 24, 2026

    BofA says you’ll be 10x more productive with AI. Ignore the 0.1% result so far

    May 24, 2026
    Facebook X (Twitter) Instagram
    New York Examiner News
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    New York Examiner News
    Home»Technology»Massive 3CX Supply-Chain Hack Targeted Cryptocurrency Firms
    Technology

    Massive 3CX Supply-Chain Hack Targeted Cryptocurrency Firms

    By AdminApril 4, 2023
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Massive 3CX Supply-Chain Hack Targeted Cryptocurrency Firms


    Software supply-chain attacks, in which hackers corrupt widely used applications to push their own code to thousands or even millions of machines, have become a scourge, both insidious and potentially huge in the breadth of their impact. But the latest major software supply-chain attack, in which hackers who appear to be working on behalf of the North Korean government hid their code in the installer for a common VoIP application known as 3CX, seems so far to have had a prosaic goal: breaking into a handful of cryptocurrency companies.

    Researchers at Russian cybersecurity firm Kaspersky today revealed that they identified a small number of cryptocurrency-focused firms as at least some of the victims of the 3CX software supply-chain attack that’s unfolded over the past week. Kaspersky declined to name any of those victim companies, but it notes that they’re based in “western Asia.” 

    Security firms CrowdStrike and SentinelOne last week pinned the operation on North Korean hackers, who compromised 3CX installer software that’s used by 600,000 organizations worldwide, according to the vendor. Despite the potentially massive breadth of that attack, which SentinelOne dubbed “Smooth Operator,” Kaspersky has now found that the hackers combed through the victims infected with its corrupted software to ultimately target fewer than 10 machines—at least as far as Kaspersky could observe so far—and that they seemed to be focusing on cryptocurrency firms with “surgical precision.”

    “This was all just to compromise a small group of companies, maybe not just in cryptocurrency, but what we see is that one of the interests of the attackers is cryptocurrency companies,” says Georgy Kucherin, a researcher on Kaspersky’s GReAT team of security analysts. “Cryptocurrency companies should be especially concerned about this attack because they are the likely targets, and they should scan their systems for further compromise.”

    Kaspersky based that conclusion on the discovery that, in some cases, the 3CX supply-chain hackers used their attack to ultimately plant a versatile backdoor program known as Gopuram on victim machines, which the researchers describe as “the final payload in the attack chain.” Kaspersky says the appearance of that malware also represents a North Korean fingerprint: It has seen Gopuram used before on the same network as another piece of malware, known as AppleJeus, linked to North Korean hackers. It’s also previously seen Gopuram connect to the same command-and-control infrastructure as AppleJeus, and has seen Gopuram used previously to target cryptocurrency firms. All of that suggests not only that the 3CX attack was carried out by North Korean hackers, but that it may have been intended to breach cryptocurrency firms in order to steal from those companies, a common tactic of North Korean hackers ordered to raise money for the regime of Kim Jong-Un.

    It has become a recurring theme for sophisticated state-sponsored hackers to exploit software supply chains to access the networks of thousands of organizations, only to winnow their focus down to a few victims. In 2020’s notorious Solar Winds spy campaign, for instance, Russian hackers compromised the IT monitoring software Orion to push malicious updates to about 18,000 victims, but they appear to have stolen data from only a few dozen of them. In the earlier supply chain compromise of the CCleaner software, the Chinese hacker group known as Barium or WickedPanda compromised as many as 700,000 PCs, but similarly chose to target a relatively short list of tech firms.



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleWild African elephants may have domesticated themselves
    Next Article Balletcore style is trending: Here’s how to get the look, according to stylists and influencers

    RELATED POSTS

    SolarSquare in talks to raise up to $60M as India’s rooftop solar market draws major VC interest

    May 24, 2026

    Memorial Day Dyson Vacuum Deals: V15 Detect, Gen5Detect, PencilVac On Sale

    May 24, 2026

    Peec, one of Berlin’s rising startups, more than doubled annualized revenue in months to $10M, sources say

    May 23, 2026

    Memorial Day Tech Deals: Sony, Apple, Beats (2026)

    May 22, 2026

    Finnish phone-maker HMD bundles Indian AI chatbot onto new smartphone in push to reach local market

    May 22, 2026

    What to Do in LA if You’re Here for Business (2025)

    May 21, 2026
    latest posts

    Rocky Kramer’s Rock & Roll Tuesdays Presents “Memorial Rock” On Tuesday, May 26th, 2026 7 PM PT on Twitch

    Rocky Kramer will be hosting “Memorial Rock” on this week’s episode of Rocky Kramer’s Rock…

    I Am a Proudly Gay Man

    May 24, 2026

    BofA says you’ll be 10x more productive with AI. Ignore the 0.1% result so far

    May 24, 2026

    Teen takeovers sweep US cities with fights, robberies and gunfire

    May 24, 2026

    SolarSquare in talks to raise up to $60M as India’s rooftop solar market draws major VC interest

    May 24, 2026

    Experimental mRNA vaccine may protect against multiple Ebola viruses

    May 24, 2026

    The Dreamed Adventure – first-look review

    May 24, 2026
    Categories
    • Books (1,262)
    • Business (6,166)
    • Events (55)
    • Film (6,103)
    • Lifestyle (4,200)
    • Music (6,221)
    • Politics (6,164)
    • Science (5,520)
    • Technology (6,098)
    • Television (5,786)
    • Uncategorized (7)
    • US News (6,154)
    popular posts

    Deep-Earth diamonds reveal trove of never-before-seen minerals

    May 14, 20263 min read Add Us On GoogleAdd SciAmDeep-Earth diamonds reveal trove of never-before-seen…

    Christine Lahti Says Sheryl Is ‘Empowered’ After Her Demonic Experience

    July 10, 2022

    WhatsApp 2023: New Privacy Features, Settings, and More

    May 16, 2023

    AOC says she was grateful to have the option of abortion after she was raped a decade ago

    June 26, 2022
    Archives
    Browse By Category
    • Books (1,262)
    • Business (6,166)
    • Events (55)
    • Film (6,103)
    • Lifestyle (4,200)
    • Music (6,221)
    • Politics (6,164)
    • Science (5,520)
    • Technology (6,098)
    • Television (5,786)
    • Uncategorized (7)
    • US News (6,154)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    Experimental mRNA vaccine may protect against multiple Ebola viruses

    May 24, 2026

    The Dreamed Adventure – first-look review

    May 24, 2026

    Do You Remember These ’80s Fads?

    May 24, 2026
    © 2026 New York Examiner News. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT