
3CX’s Software Supply Chain Compromise: Lessons Learned
3CX has transformed its software security in the two years since a damaging compromise — and RL was there to help. Here are key takeaways.
ReversingLabs
국가사이버안보센터
국제 및 국가배후 해킹 조직 관련 사이버위협 예방·대응, 보안적합성·암호모듈 검증제도 등 정보수록

State-Sponsored Financially Motivated Attacks
This is a presentation delivered at Melbourne AISA in October 2023 about a nation state investigation targeting the cryptocurrency industry.
Speaker Deck
macOS Threat Hunting: Unraveling RustBucket Malware Tactics
Master macOS threat hunting by delving into RustBucket malware analysis. Discover tactics of the notorious BlueNoroff APT and equip yourself with defense strategies.

IT threat evolution in Q2 2023
Q2 2023 overview: targeted attacks such as Operation Triangulation, CloudWizard and Lazarus activity, Nokoyawa ransomware, and others.
Kaspersky
Mac-ing Sense of the 3CX Supply Chain Attack: Analysis of the macOS Payloads
Supply chain attacks are some of the most damaging cybersecurity incidents, capable of infecting a massive number of unsuspecting users and companies through widely used and trusted software. And although the majority of such attacks impact Windows-based computers, the recent nation-state attack against the popular PBX software provider 3CX, was also capable of infecting macOS systems.
Believed to be the first "chained" supply chain attack (where initial access to 3CX was gained via a separate supply chain attack), this talk will focus on its macOS payloads. To start, we will analyze the implant installed by the attackers to maintain persistent access to 3CX's macOS build server. Then, we will dive into the malicious library that was surreptitiously slipstreamed into a malicious update and installed globally by 3CX's unsuspecting macOS enterprise users. Lastly, we'll detail the core capabilities of the self-deleting 2nd-stage payload, as well as tackle several questions it raised.
The talk will conclude by highlighting heuristic methods of detection capable of thwarting various aspects of this specific attack, even without prior knowledge. Furthermore, we will demonstrate how these approaches can be leveraged to detect and mitigate future supply chain attacks as well.
Speaker DeckTools, Code Used to Hack 3CX Desktop Confirm Lazarus Cyberespionage Group's Involvement
https://www.bankinfosecurity.com/north-korean-lazarus-group-linked-to-3cx-supply-chain-hack-a-21597 The shellcode sequence appears to have been only used in the ICONIC loader and the APPLEJEUS malware, which is known to be linked to Lazarus. Prajeet Nair
#lazarus #nkorea #3cxdesktopapp
North Korean Lazarus Group Linked to 3CX Supply Chain Hack
Security researchers have uncovered more evidence that the North Korean Lazarus group is responsible for the software supply chain attack on 3CX, a voice and video