Cybersecurity News: 3CX supply chain attack, Vulkan files leaked, Bing hijacked

Supply-chain attack on business phone provider 3CX impacts some big names

A supply-chain attack on enterprise phone company 3CX may have exposed the networks of thousands of businesses. The company confirmed on Thursday that its desktop app had been bundled with malware. 3CX provides office phone systems to a number of well known companies and organizations. Chief information security officer Pierre Jourdan, described the intrusion as “the work of highly skilled hackers,” adding, “this appears to have been a targeted attack from an Advanced Persistent Threat, perhaps even state sponsored.”

(The Record)

Vulkan files leak reveals Putin’s cyberwarfare tactics

Thousands of pages of secret documents allegedly leaked by an anonymous whistleblower reveal how engineers at NTC Vulkan in Moscow have worked for Russian military and intelligence agencies to support hacking operations, train operatives before attacks on national infrastructure, and spread disinformation and control sections of the internet. The company is linked to the federal security service FSB, the GRU and SVR (Russia’s foreign intelligence organization). One document connects a Vulkan cyber-attack tool with the Sandworm hacking group and to NotPetya malware. Crystal-2V is a “training program for cyber-operatives in the methods required to bring down rail, air, and sea infrastructure.” The date from 2016 to 2021. Five western intelligence agencies confirmed the Vulkan files appear to be authentic.

(The Guardian)

Bing search results hijacked via misconfigured Microsoft app

BingBang is the name given by analysts at Wiz Research to describe a misconfigured Microsoft application that “allowed anyone to log in and modify Bing.com search results in real-time, as well as inject XSS attacks to potentially breach the accounts of Office 365 users.” The analysts reported the issue to Microsoft on January 31, and Microsoft confirmed a fix by March 28.

(Bleeping Computer)

Over 70% of employees keep work passwords on personal devices

According to the latest mobile bring your own device (BYOD) security report from SlashNext, almost four out of every five employees “store sensitive work passwords on their personal phones, and 66% use their personal texting apps for work.” The report also suggests that “95% of security leaders are increasingly concerned about phishing attacks via private messaging apps.” SlashNext CEO Patrick Harr agrees that one reason for these numbers is that threat actors know “there are fewer security controls on personal mobile devices than on corporate ones.”

(InfoSecurity Magazine)

And now a word from our sponsor, Trend Micro

Cybersecurity is not just about protection, it’s about foresight, agility, and resilience. Navigating a new era of cyber risk demands evolved strategies, new frameworks, and integrated tools to equip security teams to anticipate and defend against even the most advanced attacks. Trend Micro, the global leader in cybersecurity is bringing the cyber risk conversation to more than 120 cities around the world in their latest “Risk to Resilience World Tour” — The largest cybersecurity roadshow of its kind. Find the closest city to you and register today to take a leap towards a more resilient future. Head to TrendMicro.com/cisoseries.

Clop hits Australia’s casino giant Crown Resorts

The casino company is the latest in a string of high profile organizations to have disclosed a data breach related to Fortra’s GoAnywhere MFT secure file transfer tool. The incident took place in January, but the company disclosed the data breach this week. A statement from Crown Resorts published on March 27, states in part, “we can confirm no customer data has been compromised and our business operations have not been impacted.”

(Security Affairs)

US commits $25 million to Costa Rica to recover from Conti ransomware

The U.S. government is sending the money to the government of Costa Rica to help the country recover from a ransomware attack that occurred last year and that crippled several key agencies. In May 2022, Costa Rican president Rodrigo Chaves declared a state of emergency after the ransomware group “severely damaged the Ministry of Finance, the Ministry of Public Works and Transport and the Costa Rican Social Security Fund.” The gang posted messages calling for the overthrow of the government and demanded a $20 million ransom. The funding will be used to secure the country’s networks and defend its critical infrastructure.

(The Record)

17% of security leaders consider cybersecurity team fully-staffed

A recent study from Immersive Labs looked at security leaders’ perception of their own cyber resilience. The study shows that despite high overall confidence, leaders consider their teams to be insufficiently prepared for threats. 82% of respondents agree they could have mitigated “some to all of the damage of their most significant cyber incident in the last year if they were better prepared, and more than 80% don’t think, or are unsure, their teams have the capabilities to respond to future attacks.” Only 17% percent consider their cybersecurity team to be fully-staffed. Just under half of respondents “admit they aren’t able to measure cyber capabilities, further eroding confidence in the organization’s preparedness.”

(Security Magazine)

Latitude Financial says data stolen by hackers belonged to way more than 330,000 customers – try 14 million 

Latitude, a finance company that offers personal loans and finance for consumers shopping at a range of retail brands in Australia and New Zealand, announced on Monday that it had “detected suspicious activity on its networks earlier this month,” and gave a number of 330,000 customers potentially impacted. The breach now appears to include 7.9 million Australian and New Zealand driver license numbers, as well as 53,000 passport numbers provided by customers over the last 10 years, as well as a further 6.1 million PII records dating back to at least 2005.

(The Record)

Steve Prentice
Author, speaker, expert in the area where people and technology crash into each other, viewed from the organizational psychology perspective. Host of many podcasts, voice actor and narrator for corporate media and audiobooks. Ghost-writer for busy executives.