logologologologo
  • HOME
  • ADVISORY
    • ERP Transformation Service
    • Cyber Security
    • Application Security
    • Process Controls Integration
    • Segregation of Duties/Sensitive Access and Cross-Platform SOD
    • Change Management
  • RISK CONSULTING AND COMPLIANCE
    • GDPR Assessment and Compliance
    • Strategic Solutions
    • Risk Assessments
    • PCI DSS Assessment
    • ISO 27001 Compliance
  • CYBER AND DATA
    • Penetration Testing
    • Cloud Security
    • IoT Security
  • MANAGED SERVICES
    • Security Operation Center
    • Incident Response
    • Digital Forensics
    • Threat Detection Engineering
    • Vulnerability Management
    • Information Technology Staff Augmentation
  • INDUSTRIES
  • CAREERS
  • BLOG
  • CONTACT
✕
MacOS Ransomware Discovered for the First Time
June 9, 2023
Apple and Google partner to stop AirTag stalking
June 9, 2023
Published by rovust on June 9, 2023
Categories
  • Industry News
Tags

The cybersecurity firm Mandiant has discovered the origin of the breach of 3CX, a Voice over Internet Protocol (VoIP) provider, whose software was corrupted by hackers linked to North Korea. Mandiant found that a 3CX employee’s computer was hacked through a software-supply-chain attack that hijacked an application of the financial software firm Trading Technologies.

That attack allowed the hackers to spread their access through 3CX’s network, corrupt a 3CX installer application, and infect hundreds of thousands of its customers. This was a rare example of how a single group of hackers used one software supply chain attack to carry out a second one, which Mandiant called a “supply-chain chain reaction.”

The North Korean hacker group responsible for this attack, known as Kimsuky, Emerald Sleet, or Velvet Chollima, is believed to be working for the North Korean regime.

The group is focused on stealing cryptocurrency, and a broad supply chain attack like the one that exploited 3CX’s software would “get you in places where people are handling money,” according to Ben Read, Mandiant’s head of cyber espionage threat intelligence.read-only system files and TCC (Transparency, Consent, and Control), which offer protection against ransomware attacks, but these features remain untested and may contain flaws.

Share
rovust
rovust

Related posts

Ethical Hacking: How Penetration Testing Saves Companies
April 24, 2025

Ethical Hacking: How Penetration Testing Saves Companies


Read more
Understanding Phishing attack and preventing them.
April 10, 2025

Passwordless Authentication: Is the Future of Login Secure?


Read more
September 2, 2024

Effective Change Management Practices in IT Environments: A Guide


Read more

Navigation

  • Home
  • Blog
  • Careers
  • Certifications and Accreditation
  • Partners
  • Contact

Services

  • Advisory
  • Risk Consulting and Compliance
  • Cyber and Data Security
  • Managed Services

Quick Contact

+1 866-224-6765
info@rovust.com
10935 Estate Lane S305,
Dallas, TX 75238

  • Privacy Policy
© 2025 Rovust | All Rights Reserved