HomeCII/OTLessons to Learn from the 3CX Hack.

Lessons to Learn from the 3CX Hack.

Published on

spot_img

The compromise of 3CX communication software has made history as the first-ever publicly documented incident of a supply-chain attack leading to another. This attack targeted critical infrastructure organizations in the energy sector and organizations in the financial sector, among others.

A supply-chain attack is a type of cyber attack that aims to bypass the security measures of a target by infiltrating their system through a trusted external provider’s software update mechanisms. In the case of 3CX, the attack began with a trojanized version of the unsupported X_TRADER financial software. This trojanized software was then used to compromise 3CX’s software and its customers.

Data from ESET telemetry suggests that there were hundreds of malicious 3CX applications used by clients. Once the trojanized X_TRADER software is installed, it gathers information and steals data, including credentials from various browsers. It also allows the attackers to issue commands on the compromised computer.

During the investigation into the related campaign called Operation DreamJob, ESET researchers found links to the Lazarus group, a North Korea-aligned threat actor. This suggests that the attack on 3CX was carried out by a sophisticated and well-resourced adversary.

The question that arises from this incident is how a company can defend itself when the threat comes from a trusted partner or provider, even when all of its security measures are in place. This highlights the need for companies to have robust security strategies that take into consideration the risks posed by their supply chain.

In this case, the compromise began with the X_TRADER software, which had been decommissioned by Trading Technologies in April 2020. However, the software remained available for download, and the vendor’s website was compromised to offer a malicious download instead. This allowed the Lazarus group to penetrate Trading Technologies and carry out the supply-chain attack.

Although Trading Technologies had communicated to its clients that the X_TRADER software would no longer be supported beyond April 2020, some individuals continued to download and use the compromised software. This highlights the importance of using verified and updated software from legitimate sources. Companies should compare the hash of the software they download with the one provided by the vendor and ensure they are downloading from a legitimate website.

Furthermore, companies should make their employees less vulnerable to attacks. In the case of the 3CX attack, the initial compromise occurred when an employee installed the compromised X_TRADER software on their personal computer. This allowed the attackers to steal the employee’s credentials and gain access to 3CX’s corporate system. To prevent such situations, companies should implement data encryption and multi-factor authentication to protect their systems. Access rights should be tightly managed, and sensitive data should only be shared through secure cloud systems.

A strong password policy is also essential in preventing attacks. Rather than constantly changing passwords and imposing complex requirements, companies should encourage the use of passphrases, which are easier to remember and harder to guess. Passphrases should still contain numbers, special characters, and even emojis to prevent machines from easily guessing them. Passkeys, which use encryption for higher protection, are also worth considering.

Privileged access management (PAM) can also help prevent attackers from compromising valuable corporate accounts. By implementing just-in-time access, monitoring privileged sessions, and enforcing stricter password policies, companies can add extra layers of protection to their critical resources. It is also important to establish strict security requirements for suppliers and partners to prevent supply-chain attacks.

Applying the latest security patches is crucial in preventing threats. In the case of the 3CX attack, the threat actors exploited a vulnerability in Windows that had been fixed by Microsoft in 2013. However, this fix was optional, allowing the attackers to trojanize the 3CX app. Therefore, companies should always ensure they have the latest security patches and updates for their software and operating systems.

Setting high security standards is essential in protecting against cyber attacks. This includes using proper antimalware software, reducing the attack surface through employee training and awareness, having security response plans in place, and regularly backing up files to ensure business continuity in the event of a disruption.

The compromise of 3CX communication software has highlighted the need for companies to be vigilant about securing their supply chain and implementing robust security measures. As the incident has shown, even with all security layers in place, the danger can come from a trusted partner or provider. By following the lessons learned from this incident and taking proactive measures, companies can better protect themselves against supply-chain attacks and other cyber threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...