Password Cyberattack: Everything You Need to Know
Cybersecurity leaders consistently rank passwords among the top concerns, recognizing them as critical gateways to sensitive data but also as prime targets for malicious entities.
Cybersecurity threats targeting critical infrastructure and global organizations have become increasingly sophisticated, as demonstrated by a cyberattack on international VoIP IPBX software developer 3CX. This incident, attributed to a North Korean state-sponsored hacker group, not only impacted 3CX but also breached the defenses of several organizations in the US and Europe, including two crucial entities in the energy sector and two financial trading firms.
According to Symantec’s Threat Hunter Team, “Initial investigation has found that among the victims are two critical infrastructure organizations in the energy sector, one in the US and the other in Europe.” The hackers did not stop there, compromising “two other organizations involved in financial trading.”
While supply chain attacks on software systems, such as the one experienced by 3CX, can be financially motivated, the breach of multiple critical infrastructure organizations raises concerns about the potential for future, more targeted exploitation. The incident underscores the vulnerability of critical infrastructure and highlights the necessity of robust cybersecurity measures.
In the cyber world, software supply chain attacks serve as an Achilles’ heel. Adversaries exploit trusted software vendors or distributors, leveraging their access to dispense malicious code to unsuspecting clients. The aftermath of these attacks is often catastrophic, potentially affecting thousands of users and circumventing security checks that focus on the software source’s authenticity.
This cyberattack commenced with a successful infiltration of the Trading Technologies’ website, a firm renowned for developing futures trading software used across various markets, from energy and agriculture to metals. The adversaries swapped the installer of X_TRADER, a retired application used for trading futures contracts from Trading Technologies, with a trojanized variant housing a backdoor named VEILEDSIGNAL.
This backdoor had a singular mission: to execute malicious code or infuse a communication module into web browsers operating on the infected systems. This malicious module granted the hackers access to sensitive data, including credentials, browser history, and cookies, and provided a platform to introduce additional malware into the compromised systems.
The trail of this attack leads to an unsuspecting employee at 3CX, a VoIP firm known for business communication solutions. The employee unknowingly paved the way for the hackers into 3CX’s network and systems by installing the trojanized X_TRADER software on their personal computer in 2022.
The hackers capitalized on their access to 3CX, launching another supply chain attack, this time by hiding malware in the 3CX Desktop App, a VoIP client. This malicious code was engineered to gather user system information and relay it back to a command-and-control server, with an additional ability to download and execute further payloads from the server. Consequently, they were able to distribute malware to 3CX’s consumers.
With over 600,000 global customers downloading the 3CX Desktop App (both Windows and macOS versions), the potential for hacker exploitation rose exponentially. 3CX confirmed the breach in March 2023, promptly releasing an update to cleanse the Desktop App of malware. The company also urged customers to change their passwords and run system checks for any signs of intrusion.
Security experts from Symantec and Mandiant, currently investigating these incidents, have connected the dots to the Lazarus Group, a notorious North Korean-backed threat actor with a reputation for cyber espionage and financially-driven operations.
The Lazarus Group, active since 2009, carries a notorious reputation, having executed high-profile cyberattacks including the Sony Pictures hack in 2014, the Bangladesh Bank cyber heist in 2016, and the WannaCry ransomware epidemic in 2017.
The experts caution that this successful model of software supply chain attacks could serve as a template for future attacks, with strategic targets potentially being those in critical infrastructure sectors.
Unveiling the depth of the cybersecurity threat, Symantec reported, “The discovery that 3CX was breached by another, earlier supply chain attack made it highly likely that further organizations would be impacted by this campaign, which now transpires to be far more wide-ranging than originally believed.” Adding a note of caution about the future, the company further warned, “It cannot be ruled out that strategically important organizations breached during a financial campaign are targeted for further exploitation.”
Given the current climate, organizations are strongly advised to be vigilant in monitoring their networks for any potential compromise and to regularly update their software applications. As a safety measure, users are also recommended to avoid downloading or installing software from untrusted sources or websites.
The recent incidents, while alarming, underscore the crucial importance of robust cybersecurity measures in this increasingly precarious digital landscape. These episodes serve as stark reminders of the potential havoc hackers can wreak, particularly when they target vital components of our critical infrastructure. Not only do they highlight the necessity for regular software updates, strong passwords, and cautious software downloading, but they also present a valuable learning opportunity. By gaining insights into the hackers’ techniques, organizations can bolster their defenses, better safeguarding themselves and their customers.
In this digital age, the call to action is undeniable: Cybersecurity is not solely an IT issue—it’s a universal concern. As we navigate this treacherous terrain, organizations must be vigilant, reinforcing their defenses and preparing for the inevitable cyber battles that lie ahead.
Industrial Cybersecurity
September 28, 2023
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings
Cybersecurity leaders consistently rank passwords among the top concerns, recognizing them as critical gateways to sensitive data but also as prime targets for malicious entities.
The Internet of Things (IoT) is reshaping our world. As sectors ranging from healthcare to manufacturing integrate IoT technology into their operations, we can expect
Even as the digital revolution continues to reshape industries, a significant portion of the ICS/OT sector remains vulnerable to cyberattacks, with email phishing as a
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings