N.K. Hackers Employ Matryoshka Doll-Style Cascading Supply Chain Attack on 3CX,
The supply chain attack targeting 3CX was the result of a prior supply chain compromise associated with a different company, demonstrating a new level of sophistication with North Korean threat actors.
Google-owned Mandiant, which is tracking the attack event under the moniker UNC4736, said the incident marks the first time it has seen a « software supply chain attack lead to another software
Google-owned Mandiant, which is tracking the attack event under the moniker UNC4736, said the incident marks the first time it has seen a « software supply chain attack lead to another software
,
The supply chain attack targeting 3CX was the result of a prior supply chain compromise associated with a different company, demonstrating a new level of sophistication with North Korean threat actors.
Google-owned Mandiant, which is tracking the attack event under the moniker UNC4736, said the incident marks the first time it has seen a « software supply chain attack lead to another software
Google-owned Mandiant, which is tracking the attack event under the moniker UNC4736, said the incident marks the first time it has seen a « software supply chain attack lead to another software
, ,
https://thehackernews.com/2023/04/nk-hackers-employ-matryoshka-doll-style.html