wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/04\/11\/3cx-north-korea-cryptocurrency-hack\/<\/a><\/br> Enterprise phone provider 3CX has confirmed that North Korea-backed hackers were behind last month\u2019s supply chain attack<\/a> that appeared to target cryptocurrency companies.<\/p>\n 3CX, which provides online voice, video conferencing and messaging services for businesses, worked with cybersecurity company Mandiant<\/a> to investigate the attack. Hackers compromised the company\u2019s desktop phone software used by hundreds of thousands of organizations to plant information-stealing malware inside their customers\u2019 corporate networks.<\/p>\n 3CX chief information security officer Pierre Jourdan said<\/a> on Tuesday that their investigation confirms that hackers linked to the North Korean regime were behind the attack.<\/p>\n \u201cBased on the Mandiant investigation into the 3CX intrusion and supply chain attack thus far, they attribute the activity to a cluster named UNC4736,\u201d Jourdan said. \u201cMandiant assesses with high confidence that UNC4736 has a North Korean nexus.\u201d<\/p>\n Cybersecurity giant CrowdStrike last week linked the 3CX breach to hackers it calls Labyrinth Chollima, a subunit of the notorious Lazarus Group, which is known for stealthy hacks targeting cryptocurrency<\/a> exchanges<\/a> to fund its nuclear weapons program.\u00a0Russia-based Kaspersky Lab also attributed the 3CX breach to North Korea.<\/p>\n Kaspersky said in its analysis<\/a> of the attack that the hackers were seen deploying a backdoor, which it has named \u201cGopuram,\u201d onto infected systems, noting that the attackers have \u201ca specific interest in cryptocurrency companies.\u201d Kaspersky added that Gopuram was deployed on less than ten machines, indicating<\/span> that the attackers used this backdoor with \u201csurgical precision.\u201d<\/p>\n
\n3CX blames North Korea for supply chain mass-hack<\/br>
\n2023-04-11 21:44:40<\/br><\/p>\n