Common Information
Type | Value |
---|---|
Value |
Supply Chain Compromise - T1195 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | Supply chain compromise is the manipulation of products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise can take place at any stage of the supply chain including: * Manipulation of development tools * Manipulation of a development environment * Manipulation of source code repositories (public or private) * Manipulation of software update/distribution mechanisms * Compromised/infected system images (multiple cases of removable media infected at the factory) * Replacement of legitimate software with modified versions * Sales of modified/counterfeit products to legitimate distributors * Shipment interdiction While supply chain compromise can impact any component of hardware or software, attackers looking to gain execution have often focused on malicious additions to legitimate software in software distribution or update channels. (Citation: Avast CCleaner3 2018) (Citation: Microsoft Dofoil 2018) (Citation: Command Five SK 2011) Targeting may be specific to a desired victim set (Citation: Symantec Elderwood Sept 2012) or malicious software may be distributed to a broad set of consumers but only move on to additional tactics on specific victims. (Citation: Avast CCleaner3 2018) (Citation: Command Five SK 2011) Detection: Use verification of distributed binaries through hash checking or other integrity checking mechanisms. Scan downloads for malicious signatures and attempt to test software and updates prior to deployment while taking note of potential suspicious activity. Perform physical inspection of hardware to look for potential tampering. Platforms: Linux, Windows, macOS Data Sources: Web proxy, File monitoring |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-04-23 | 0 | L’hebdo cybersécurité | 23 avr 2023 | ||
Details | Website | 2023-04-22 | 4 | Critical infrastructure also hit by supply chain attack behind 3CX breach - RedPacket Security | ||
Details | Website | 2023-04-22 | 89 | Bluepurple Pulse: week ending April 23rd | ||
Details | Website | 2023-04-21 | 4 | N.K. Hackers Employ Matryoshka Doll-Style Cascading Supply Chain Attack on 3CX | ||
Details | Website | 2023-04-21 | 2 | N.K. Hackers Employ Matryoshka Doll-Style Cascading Supply Chain Attack on 3CX - RedPacket Security | ||
Details | Website | 2023-04-21 | 3 | The 3CX attack gets wilder, marks first 'cascading software supply chain compromise' | ||
Details | Website | 2023-04-21 | 1 | 3CX hack due to prior supply chain compromise | ||
Details | Website | 2023-04-21 | 4 | 3CX hack caused by trading software supply chain attack - RedPacket Security | ||
Details | Website | 2023-04-21 | 4 | Critical infrastructure also hit by supply chain attack behind 3CX breach | ||
Details | Website | 2023-04-21 | 2 | 3CX hack highlights risk of cascading software supply-chain compromises | ||
Details | Website | 2023-04-20 | 1 | 3CX Breach Was a Double Supply Chain Compromise – Krebs on Security | ||
Details | Website | 2023-04-20 | 2 | 3CX Supply Chain Attack Tied to Financial Trading App Breach | ||
Details | Website | 2023-04-20 | 1 | Infected app on employee’s PC led to 3CX compromise: Report | IT World Canada News | ||
Details | Website | 2023-04-20 | 1 | Another software supply chain attack discovered during 3CX investigation | ||
Details | Website | 2023-04-20 | 72 | 3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible | Mandiant | ||
Details | Website | 2023-04-20 | 0 | Intelligence Insights: April 2023 | ||
Details | Website | 2023-04-19 | 0 | China Leverages Exposed Secrets to Keep the United States on Its Heels | ||
Details | Website | 2023-04-14 | 10 | Ransomware Roundup – Kadavro Vector Ransomware | FortiGuard Labs | ||
Details | Website | 2023-04-12 | 8 | Lazarus Sub-Group Labyrinth Chollima Uncovered as Mastermind in 3CX Supply Chain Attack | ||
Details | Website | 2023-04-04 | 0 | 3CX supply chain attack: cryptocurrency firms targeted | ||
Details | Website | 2023-04-04 | 9 | SANS ISC Stormcast: Daily Network Security News Summary; Cyber Security Podcast | ||
Details | Website | 2023-04-03 | 0 | 3CX Attack Shows The Dangers Of ‘Alert Fatigue’ For Cybersecurity | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware – National Cyber Security Consulting | ||
Details | Website | 2023-04-03 | 0 | Questions remain around 3CX supply chain attack | ||
Details | Website | 2023-04-03 | 22 | Anomali Cyber Watch: Balada Injector Exploits WordPress Elementor Pro, Icon 3CX Stealer Detected by YARA, Koi Loader-Stealer Compresses-then-Encrypts Memory Streams | ||
Details | Website | 2023-04-03 | 0 | 6 Steps to Ensure a More Secure Supply Chain Environment |