News:
Researchers at Russian cybersecurity firm Kaspersky today revealed that they identified a small number of cryptocurrency-focused firms as at least some of the victims of the 3CX software supply-chain attack that’s unfolded over the past week. Kaspersky declined to name any of those victim companies, but it notes that they’re based in “western Asia.”
Security firms CrowdStrike and SentinelOne last week pinned the operation on North Korean hackers, who compromised 3CX installer software that’s used by 600,000 organizations worldwide, according to the vendor. Despite the potentially massive breadth of that attack, which SentinelOne dubbed “Smooth Operator,” Kaspersky has now found that the hackers combed through the victims infected with its corrupted software to ultimately target fewer than 10 machines—at least as far as Kaspersky could observe so far—and that they seemed to be focusing on cryptocurrency firms with “surgical precision.”
More Stories
Threat Actors Abuse Trust in Cloud Collaboration Platforms
Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials Read More
Malicious npm Packages Deliver Sophisticated Reverse Shells
A newly discovered malware campaign uses malicious npm packages to deploy reverse shells, compromising development environments Read More
ETSI Publishes New Quantum-Safe Encryption Standards
Standards body ETSI has defined a scheme for key encapsulation mechanisms with access control (KEMAC), enabling quantum-secure encryption Read More
AI Data Poisoning
Cloudflare has a new feature—available to free users as well—that uses AI to generate random pages to feed to AI...
ENISA Probes Space Threat Landscape in New Report
EU security agency ENISA has released a new report outlining the threats and potential mitigations for the space sector Read...
UK Government’s New Fraud Strategy to Focus on Tech-Enabled Threats
The UK government’s new fraud minister will today announce plans for a newly expanded fraud strategy Read More