Monday, November 25, 2024
HomeLinux malwareOperation DreamJob - New Linux Malware Linked With 3CX Supply-Chain Attack

Operation DreamJob – New Linux Malware Linked With 3CX Supply-Chain Attack

Published on

ESET researchers have recently discovered that Linux users targeted with malware in the new “Operation DreamJob” Lazarus campaign for the first time.

The group behind DreamJob deploys social engineering tactics with the guise of fake job offers as lures to compromise its targets.

Experts could reconstruct the complete sequence by tracing the chain from a false HSBC job offer in a ZIP file to the distribution of the SimplexTea Linux backdoor via an OpenDrive cloud storage account.

- Advertisement - SIEM as a Service

This North Korea-linked threat actor’s use of Linux malware in this operation is publicly mentioned for the first time. This discovery also enabled experts to confirm that Lazarus was responsible for the 3CX supply-chain attack.

3CX Supply-chain Attack

Many companies rely on 3CX for their phone systems service, as it is one of the leading international providers of VoIP and telephone services.

There are more than 600,000 customers available to 3CX, and in the following sectors, it also has more than 12,000,000 users:-

  • Aerospace
  • Healthcare
  • Hospitality

The discovery of malicious code in the desktop application for Windows and macOS was made in March 2023.

While this allowed the downloading and running of arbitrary code on all machines with the installed application by a group of attackers.

As a result, the 3CX software was hacked, and external attackers used it to distribute malware to specific customers as part of a supply-chain attack.

Here Below we have mentioned the timeline:-

Operation Dream Job

The group behind Operation Dream Job (aka DeathNote or NukeSped) uses fake job offers to trick people into downloading malware in multiple attack waves.

At the moment, it’s unclear how the ZIP file was distributed, but spear-phishing or direct messages on LinkedIn are the suspected methods.

These social engineering attacks deceive victims into downloading files that infect their computers with malware by posing as employment-related documents, ESET Says.

Apart from this, the backdoor written in C++ has the same appearance as the one previously associated with the group called BADCALL, it’s another Windows trojan.

The ZIP archive that is in question is distributed via spearphishing or direct messages on LinkedIn and the archive is named:-

  • HSBC job offer.pdf.zip

A Linux binary written in Go is hidden inside the archive, which is named with a Unicode character to appear as a PDF file.

The filename’s extension isn’t “.pdf” because the apparent dot is a U+2024 Unicode character that serves as a leader dot.

The leader dot in the filename was likely a trick to fool the file manager into running the file as an executable rather than a PDF, leading to unintended execution upon double-clicking.

Double-clicking the file launches the OdicLoader malware, which downloads a second-stage malware from a private repository on OpenDrive while displaying a fake PDF document as a decoy.

OdicLoader delivers the SimplexTea payload, which it drops at ~/.config/guiconfigd/SimplexTea, and alters the user’s ~/.bash_profile to ensure that SimplexTea runs with Bash and remains silenced during new shell sessions.

Supply-chain attacks are a favored method of malware distribution for their stealthiness, and Lazarus used this technique in 2020 to target South Korean users of WIZVERA VeraPort software.

Previous Operation DreamJob attacks by Lazarus were incredibly lucrative, resulting in the group’s theft of $620 million from Axie Infinity.

The techniques and similarities observed in the recent 3CX hack align with the Lazarus group’s typical modus operandi and toolset, indicating their strong involvement.

Moreover, the notorious group Lazarus has claimed another high-profile win with their recent supply-chain attack on 3CX.

Building Your Malware Defense Strategy – Download Free E-Book

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and...

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip,...

Massive Credit Card Leak, Database of 1,221,551 Cards Circulating on Dark Web

A massive data breach has sent shockwaves across the globe, as a database containing...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to...

Raspberry Robin Employs TOR Network For C2 Servers Communication

Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade...