News:
Researchers at Russian cybersecurity firm Kaspersky today revealed that they identified a small number of cryptocurrency-focused firms as at least some of the victims of the 3CX software supply-chain attack that’s unfolded over the past week. Kaspersky declined to name any of those victim companies, but it notes that they’re based in “western Asia.”
Security firms CrowdStrike and SentinelOne last week pinned the operation on North Korean hackers, who compromised 3CX installer software that’s used by 600,000 organizations worldwide, according to the vendor. Despite the potentially massive breadth of that attack, which SentinelOne dubbed “Smooth Operator,” Kaspersky has now found that the hackers combed through the victims infected with its corrupted software to ultimately target fewer than 10 machines—at least as far as Kaspersky could observe so far—and that they seemed to be focusing on cryptocurrency firms with “surgical precision.”
More Stories
Royal Mail Investigates Data Breach Affecting Supplier
A cyber threat actor has claimed to have leaked 144GB of data from Royal Mail users Read More
Gray Bots Surge as Generative AI Scraper Activity Increases
Gray bots surge as generative AI scraper activity increases, impacting web applications with millions of requests daily Read More
Bybit Heist Fuels Record Crypto-Theft Surge, Says CertiK
Hackers stole $1.67bn of cryptocurrencies in the first quarter of 2025, a 303% increase Read More
Rational Astrologies and Security
John Kelsey and I wrote a short paper for the Rossfest Festschrift: “Rational Astrologies and Security“: There is another non-security...
North Korea’s Fake IT Worker Scheme Sets Sights on Europe
Google has found a significant increase in North Korean actors attempting to gain employment as IT workers in European companies,...
Steam Surges to Top of Most Spoofed Brands List in Q1
Gaming community Steam appeared most often in phishing emails and texts detected by Guardio in Q1 2025 Read More