Numerous orgs hacked after installing weaponized open source apps

Discussion in 'other security issues & news' started by hawki, Sep 29, 2022.

  1. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,130
    Location:
    DC Metro Area
    "PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and muPDF/Subliminal Recording all targeted.

    Hackers backed by the North Korean government [Lazarus] are weaponizing well-known pieces of open source software in an ongoing campaign that has already succeeded in compromising 'numerous' organizations in the media, defense and aerospace, and IT services industries, Microsoft said on Thursday..."

    https://arstechnica.com/information...re-weaponizing-all-kinds-of-open-source-apps/
     
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Wow, these are the most scary attacks since it involves trojanized apps that mimmick the real ones. That's why I will always stick to my motto to never trust any app! They should always be monitored for suspicious behavior. However, these files weren't downloaded from the software developers directly, so it's not really a supply chain attack.
     
  3. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Here is yet another supply chain attack, it's a bit troubling if you can't even trust official download sites. That's why it's always a good idea to use a behavior blocker since AV's can often NOT spot these kind of attacks. BTW, I have never heard of Comm100.
    https://www.darkreading.com/attacks...ed-supply-chain-attack-comm100-chat-installer
    https://www.crowdstrike.com/blog/new-supply-chain-attack-leverages-comm100-chat-installer/
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.