3CX supply chain hack also impacted critical infrastructure orgs in the US and Europe

3CX supply chain hack also impacted critical infrastructure orgs in the US and Europe

The North Korean 3CX software supply chain attack known as the X_Trader has affected two critical infrastructure organizations in the energy sector in the US and Europe, as well as two other organizations involved in financial trading, new data from Broadcom’s Symantec shows.

As per a previous report from cybersecurity firm Mandiant, the cause of the March 3CX breach was trojanized X_Trader platform developed by Trading Technologies, a company that provides software for professional traders.

Mandiant says it was the first time it has seen a software supply chain attack lead to another software supply chain attack. In this case, the attackers used their access to a Trading Technologies platform to gain access to 3CX’s network, where they then modified desktop apps in order to compromise the networks of 3CX’s customers and deploy the Veiledsignal multi-stage modular backdoor onto victims' systems. The company linked the attacks to a North Korean threat actor it tracks as UNC4736, believed to be a Lazarus sub-group dubbed Labyrinth Chollima.

“It appears likely that the X_Trader supply chain attack is financially motivated, since Trading Technologies, the developer of X_Trader, facilitates futures trading, including energy futures. Nevertheless, the compromise of critical infrastructure targets is a source of concern,” Symantec notes.

Symantec’s report does not name the organizations impacted in the hack, but provides additional Indicators of Compromise (IoCs) to help defenders identify this threat.

“The discovery that 3CX was breached by another, earlier supply chain attack made it highly likely that further organizations would be impacted by this campaign, which now transpires to be far more wide-ranging than originally believed. The attackers behind these breaches clearly have a successful template for software supply chain attacks and further, similar attacks cannot be ruled out,” the cybersecurity firm said.


Back to the list

Latest Posts

UAT-5918 info-stealing campaign targets critical infrastructure entities in Taiwan

UAT-5918 info-stealing campaign targets critical infrastructure entities in Taiwan

The tactics and tools employed by UAT-5918 overlap with other state-sponsored threat groups, such as Volt Typhoon, Flex Typhoon, and Earth Estries.
20 March 2025
New supply chain attack allows to inject malicious code via AI code editors

New supply chain attack allows to inject malicious code via AI code editors

By exploiting hidden unicode characters and employing advanced evasion techniques, attackers can subtly alter the behavior of AI models.
19 March 2025
Russian disinformation actors employ new tactics to maintain influence

Russian disinformation actors employ new tactics to maintain influence

Rather than immediately deploying newly registered domains, many threat actors now secure domain names months in advance.
19 March 2025