Skip to content

ESET Research discovers new Lazarus DreamJob campaign and links it to phone provider 3CX supply-chain attack

  • ESET researchers have discovered a new Lazarus Operation DreamJob campaign targeting Linux users.
  • Operation DreamJob is the name for a series of campaigns where the group uses social engineering techniques to compromise its targets, with fake job offers as the lure.
  • ESET reconstructed the full chain, from the ZIP file that delivers a fake HSBC job offer as a decoy up until the final backdoor payload.
  • Similarities with this latest Linux backdoor link it with high confidence to the 3CX supply-chain attack. 3CX is an international VoIP software developer and distributor that provides phone system services.
  • 3CX was compromised and its software was used in a supply-chain attack driven by external threat actors to distribute additional malware to specific 3CX customers. The attack had been planned well in advance – as early as December 2022.

BRATISLAVA, PRAGUE — April 20, 2023 — ESET researchers have discovered a new Lazarus Operation DreamJob campaign targeting Linux users. ESET Research was able to reconstruct the full chain, from the ZIP file that delivers a fake HSBC job offer as a decoy up until the final payload: the SimplexTea Linux backdoor distributed through an OpenDrive cloud storage account. It is the first time for this major North Korea–aligned threat actor to be using Linux malware as part of this operation. Similarities with this newly discovered Linux malware corroborate the theory that the infamous North Korea–aligned group is behind the 3CX supply-chain attack.

“This latest discovery provides corroborating evidence and reinforces our high level of confidence that the recent 3CX supply-chain attack was in fact conducted by Lazarus – a link that was suspected from the very beginning and demonstrated by several security researchers since,” says ESET researcher Peter Kálnai, who investigates Lazarus activities.

3CX is an international VoIP software developer and distributor that provides phone system services to many organizations. According to its website, 3CX has more than 600,000 customers and 12 million users in various sectors, including aerospace, healthcare, and hospitality. It provides client software to use its systems via a web browser, mobile app, or a desktop application. Late in March 2023, it was discovered that the desktop application for both Windows and macOS contained malicious code that enabled a group of attackers to download and run arbitrary code on all machines where the application was installed. 3CX itself was compromised and its software was used in a supply-chain attack driven by external threat actors to distribute additional malware to specific 3CX customers.

The perpetrators had planned the attacks long before execution – as early as December 2022. This suggests that they already had a foothold inside 3CX’s network late last year. Several days before the attack was publicly revealed, a mysterious Linux downloader was submitted to VirusTotal. It downloads a new Lazarus backdoor for Linux, SimplexTea, which connects to the same Command & Control server as payloads involved in the 3CX compromise.

“This compromised software, deployed on various IT infrastructures, allows the download and execution of any kind of payload, which can have devastating impacts. The stealthiness of a supply-chain attack makes this method of distributing malware very appealing from an attacker’s perspective, and Lazarus has already used this technique in the past,” explains Kálnai. “It is also interesting to note that Lazarus can produce and use native malware for all major desktop operating systems: Windows, macOS, and Linux,” adds Marc-Etienne M.Léveillé , ESET researcher who helped with the research.

Operation DreamJob is the name for a series of campaigns where Lazarus uses social engineering techniques to compromise its targets, with fake job offers as the lure. On March 20, a user in the country of Georgia submitted to VirusTotal a ZIP archive called HSBC job offer.pdf.zip. Given other DreamJob campaigns by Lazarus, this payload was probably distributed through spearphishing or direct messages on LinkedIn. The archive contains a single file: a native 64-bit Intel Linux binary written in Go and named HSBC job offer․pdf.

For more technical information about the latest Lazarus DreamJob campaign and links to the 3CX supply-chain attack, check out the blog post “Linux malware strengthens links between Lazarus and the 3CX supply-chain attack” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET Discovers Corporate Secrets and Data on Recycled Company Routers

  • Over 56% of the core routers ESET purchased from secondary market vendors contained a treasure trove of sensitive data, including corporate credentials, VPN details, cryptographic keys, and more.
  • In the wrong hands, this data is enough to jump-start a cyberattack that could lead to a data breach, placing the company, its partners and customers at risk.
  • This research shows that companies are not following sufficient security protocols and processes for decommissioning hardware.
  • A number of impacted organizations were unresponsive to ESET’s disclosures and communications.

BRATISLAVA, SAN DIEGO — April 18, 2023 —ESET, a global leader in digital security, today unveiled new research into corporate network devices that were disposed of and sold on the secondary market. After looking at configuration data from 16 distinct network devices, ESET found that over 56% – nine routers – contained sensitive company data.

Of the nine networks that had complete configuration data available:

  • 22% contained customer data
  • 33% exposed data allowing third-party connections to the network
  • 44% had credentials for connecting to other networks as a trusted party
  • 89% itemized connection details for specific applications
  • 89% contained router-to-router authentication keys
  • 100% contained one or more of IPsec or VPN credentials, or hashed root passwords
  • 100% had sufficient data to reliably identify the former owner/operator

“The potential impact of our findings is extremely concerning and should be a wake-up call,” said Cameron Camp, the ESET security researcher who led the project. “We would expect medium-sized to enterprise companies to have a strict set of security initiatives to decommission devices, but we found the opposite. Organizations need to be much more aware of what remains on the devices they put out to pasture, since a majority of the devices we obtained from the secondary market contained a digital blueprint of the company involved, including, but not limited to, core networking information, application data, corporate credentials, and information about partners, vendors, and customers.”

Organizations often recycle aging tech through third-party companies that are charged with verifying the secure destruction or recycling of digital equipment and the disposal of the data contained therein. Whether an error by an e-waste company or the company’s own disposal processes, a range of data was found on the routers, including:

  • Third-party data: As we have seen in real-world cyberattacks, a breach of one company’s network can proliferate to their customers, partners, and other businesses with whom they may have connections.
  • Trusted parties: Trusted parties (which could be impersonated as a secondary attack vector) would accept certificates and cryptographic tokens found on these devices, allowing a very convincing adversary in the middle (AitM) attack with trusted credentials, capable of syphoning off corporate secrets, with victims unaware for extended periods.
  • Customer data: In some cases, core routers point to internal and/or external information stores with specific information about their owners’ customers, sometimes stored on premises, which can open customers up to potential security issues if an adversary is able to gain specific information about them.
  • Specific applications: Complete maps of major application platforms used by specific organizations, both locally hosted and in the cloud, were scattered liberally throughout the configurations of these devices. These applications range from corporate email to trusted client tunnels for customers, physical building security such as specific vendors and topologies for proximity access cards and specific surveillance camera networks, and vendors, sales and customer platforms, to mention a few. Additionally, ESET researchers were able to determine over which ports and from which hosts those applications communicate, which ones they trust, and which ones they do not. Due to the granularity of the applications and the specific versions used in some cases, known vulnerabilities could be exploited across the network topology that an attacker would already have mapped.
  • Extensive core routing information: From core network routes to BGP peering, OSPF, RIP and others, ESET found complete layouts of various organizations’ inner workings, which would provide extensive network topology information for subsequent exploitation, were the devices to fall into the hands of an adversary. Recovered configurations also contained nearby and international locations of many remote offices and operators, including their relationship to the corporate office – more data that would be highly valuable to potential adversaries. IPsec tunneling can be used to connect trusted routers to each other, which can be a component of WAN router peering arrangements and the like.
  • Trusted operators: The devices were loaded with potentially crackable or directly reusable corporate credentials – including administrator logins, VPN details, and cryptographic keys – that would allow bad actors to seamlessly become trusted entities and thus to gain access across the network.

“There are well-documented processes for proper decommissioning of hardware, and this research shows that many companies are not following them rigorously when preparing devices for the secondary hardware market,” said Tony Anscombe, Chief Security Evangelist at ESET. “Exploiting a vulnerability or spearphishing for credentials is potentially hard work. But our research shows that there is a much easier way to get your hands on this data, and more. We urge organizations involved in device disposal, data destruction, and reselling of devices to take a hard look at their processes and ensure they are in compliance with the latest NIST standards for media sanitization.”

The routers in this research originated at organizations ranging from medium-sized businesses to global enterprises in a variety of industries (data centers, law firms, third-party tech providers, manufacturing and tech companies, creative firms, and software developers). As part of the discovery process, ESET, where possible, disclosed the findings to each identified organization – several of them household names – collaborating to ensure they were aware of the details potentially compromised by others in the chain of custody of the devices. Some of the organizations with compromised information were shockingly unresponsive to ESET’s repeated attempts to connect, while others showed proficiency, handling the event as a full-blown security breach.

Organizations are reminded to verify that they are using a trusted, competent third party to dispose of devices, or that they are taking all the necessary precautions if handling the decommissioning themselves. That should extend past routers and hard drives to any device that’s part of the network. Many organizations in this research probably felt that they were contracting with reputable vendors, but their data still leaked. With this in mind, it’s recommended that organizations follow the manufacturer’s guidelines for removing all data from a device before it physically leaves their premises, which is a simple step that many IT staff can handle.

Organizations are reminded to treat disclosure notifications seriously. Doing otherwise may leave them vulnerable to a costly data breach and significant reputational damage.

At RSA 2023, Camp and Anscombe will present this research at the presentation “We (Could Have) Cracked Open the Network for Under $100” on April 24, 2023, at 9:40 a.m. PT.

To read the white paper, which includes resources on secure device disposal, visit our new blog post “Discarded, not destroyed: Old routers reveal corporate secrets” on WeLiveSecurity.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Great Minds Make Great Tech with Claude Morings Jr

It’s been an exciting month for us here at CloudM as we get set to officially launch our US subsidiary, CloudM Inc. With over 10 years of experience in the US market already, this natural evolution promises to deliver an even better customer experience for our amazing North American customers.

What better time to celebrate the staff that have supported our US market and made this next step possible. And, who better to speak to than US employee no.1 – Claude Morings Jr.

Hi Claude – Tell us a little bit about yourself?

Hey! I’m the Global Product Support Manager here at CloudM. I joined 4 years ago (this month to be exact) as CloudM’s very first US employee.

Wow! And now we have 13 US based employees and growing, with a US subsidiary being established. You must’ve seen some changes in the past 4 years

Absolutely. Personally, I’ve been able to grow the Support Team out from a solely UK based operation to a truly global department, with dedicated, knowledgeable staff located around the globe (including APAC), delivering true 24 / 7 support.

None of this was in place, and to have that set on my shoulders as a deliverable when accepting the role was a lot of pressure. But, it has created the amazing support team we have now, which I’m extremely proud of.

In the US, helping the business get the right people in place and seeing the business grow to generate the revenue to get here, establishing CloudM Inc., has been so rewarding. In the last year alone, the number of US based employees has skyrocketed and it’s only set to continue. That can only be good for our customers.

So, what do you enjoy about working at CloudM?

Firstly, my team. My favorite parts of the week are when someone within the team achieves a goal, receives good feedback, or puts a process in place that benefits them and their colleagues. I was given the opportunity to build the team and put people in those positions to showcase their talents so it feels like validation.

I really like how we make remote working work, even across multiple time zones and regions. It’s great to feel like one team with colleagues across APAC, Europe and North America (from sea to shining sea).

Saying that, getting the opportunity to meet up in person is amazing. I’m from a small town in North Carolina, and while I have traveled across the world during my 12 years in the Army, my family is amazed when I tell them I’m visiting the head office based in the UK or that I get to go to Spain for a company kickoff meeting.

What is your favorite CloudM value?

My favorite value is to appreciate others. I can crack on, try new things, and get involved, but showing others that they’re appreciated (and feeling appreciated) makes the other values easier to achieve.

Any advice for someone looking to join the CloudM team?

It will be challenging, but we will have fun and you will feel supported. At CloudM, you will only fail if you choose to. The team here is pretty good at circling the wagons around someone who needs extra assistance, sharing their own experiences and knowledge.

It’s a great time to get involved. The CloudM team, globally and in the US, is growing and there are so many opportunities for personal and career growth. If you are hard working, eager to learn and challenge yourself, CloudM is a great place to work.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CloudM
CloudM is an award-winning SaaS company whose humble beginnings in Manchester have grown into a global business in just a few short years.

Our team of tech-driven innovators have designed a SaaS data management platform for you to get the most from your digital workspace. Whether it’s Microsoft 365, Google Workspace or other SaaS applications, CloudM drives your business through a simple, easy-to-use interface, helping you to work smarter, not harder.

By automating time-consuming tasks like IT admin, onboarding & offboarding, archiving and migrations, the CloudM platform takes care of the day-to-day, allowing you to focus on the big picture.

With over 35,000 customers including the likes of Spotify, Netflix and Uber, our all-in-one platform is putting office life on auto-pilot, saving you time, stress and money.

23.3.4 ‘Voyager’ released

Changes compared to 23.3.3

New Features

  • Add the ability to search for items to restore within Storage Vault snapshots via the Comet Server web interface

Bug Fixes

  • Fix an issue with opening the Comet Server web interface for some admin accounts with restricted permissions
  • Fix an issue with pre-configuring backup options when clicking “Run backup” on a Protected Item in the Comet Server web interface
  • Fix an issue adding email addresses to user profiles in the Comet Server web interface
  • Fix an issue with incorrect Backblaze B2 storage validation
  • Fix an issue with validation on the Storage Role while the Storage Role is disabled
  • Fix a cosmetic issue with widgets on the About This Server page in the Comet Server web interface
  • Fix a cosmetic issue with widgets on the Comet Server web interface homepage disappearing on page reload

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

安全至上!給 Bloggers 的 5 個網絡安全技巧

網絡作家的職業需要經常使用網絡,這也意味著他們有可能成為黑客攻擊的目標。不幸的是,很多人經常忽略網絡安全,這可能導致機密信息被盜或系統受到攻擊。因此,本文提供了 5 個簡單的網絡安全技巧,讓網絡作家保持安全。 

1. 選擇安全的密碼
一個安全的密碼應該是由大寫和小寫字母、數字和符號組成的。儘可能使用長度超過 12 個字符的密碼,並避免使用生日、名字或常見詞彙作為密碼。為了保持安全,不要將同一密碼用於多個帳戶,否則一旦一個帳戶被盜,所有帳戶都會受到影響。

2. 安裝防毒軟件
防毒軟件可以防止電腦感染病毒,特別是當你訪問不安全的網站時。大多數防毒軟件都會提供即時保護,防止惡意軟件在你的電腦上運行。建議定期更新防病毒軟件,以保持最新的保護措施。

3. 備份你的數據
在網絡作家的職業中,大多數工作都是在網上進行的,因此,數據非常重要。儘可能定期備份你的數據,以防止數據丟失。你可以使用外部硬碟、雲端儲存或其他數據備份工具。

4. 使用 VPN
VPN(虛擬私人網絡)可以保護你在互聯網上的私隱。使用 VPN 時,你的網絡活動將被加密,黑客無法輕易地監視你的網絡活動。此外,VPN 還可以幫助你繞過地理位置限制,訪問其他國家的網站。請注意,選擇一個可靠的 VPN 非常重要,因為一些不良的 VPN 可能會收集你的數據或違反你的私隱權利。

5. 保持警覺
最後,保持警覺是保持網絡安全的關鍵。網絡作家應該時刻關注他們的網絡活動,並懷疑所有看起來不尋常的活動或消息。切勿點擊可疑的超連結或下載未知的軟件。如果你發現任何可疑的活動,請立即更改密碼並通知相關的網站或服務。

總結

作為網絡作家,網絡安全是非常重要的。選擇安全的密碼,安裝防病毒軟件,備份你的數據,使用 VPN,以及保持警覺,這些都是保持網絡安全的重要步驟。請注意,這些技巧只是保持安全的開始,網絡安全是一個不斷發展的領域,你應該定期關注新的安全威脅。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×