[ad_1]
Similarities with newly found Linux malware utilized in Operation DreamJob corroborate the speculation that the notorious North Korea-aligned group is behind the 3CX supply-chain assault
ESET researchers have found a brand new Lazarus Operation DreamJob marketing campaign focusing on Linux customers. Operation DreamJob is the identify for a sequence of campaigns the place the group makes use of social engineering methods to compromise its targets, with pretend job presents because the lure. On this case, we have been capable of reconstruct the complete chain, from the ZIP file that delivers a pretend HSBC job supply as a decoy, up till the ultimate payload: the SimplexTea Linux backdoor distributed by way of an OpenDrive cloud storage account. To our information, that is the primary public point out of this main North Korea-aligned risk actor utilizing Linux malware as a part of this operation.
Moreover, this discovery helped us affirm with a excessive stage of confidence that the current 3CX supply-chain assault was actually carried out by Lazarus – a hyperlink that was suspected from the very starting and demonstrated by a number of safety researchers since. On this blogpost, we corroborate these findings and supply extra proof concerning the connection between Lazarus and the 3CX supply-chain assault.
The 3CX supply-chain assault
3CX is a global VoIP software program developer and distributor that gives telephone system companies to many organizations. In line with its web site, 3CX has greater than 600,000 clients and 12,000,000 customers in numerous sectors together with aerospace, healthcare, and hospitality. It offers consumer software program to make use of its programs by way of an online browser, cell app, or a desktop software. Late in March 2023, it was found that the desktop software for each Home windows and macOS contained malicious code that enabled a gaggle of attackers to obtain and run arbitrary code on all machines the place the appliance was put in. Quickly, it was decided that this malicious code was not one thing that 3CX added themselves, however that 3CX was compromised and that its software program was utilized in a supply-chain assault pushed by exterior risk actors to distribute extra malware to particular 3CX clients.
This cyber-incident has made headlines in current days. Initially reported on March 29th, 2023 in a Reddit thread by a CrowdStrike engineer, adopted by an official report by CrowdStrike, stating with excessive confidence that LABIRINTH CHOLLIMA, the corporate’s codename for Lazarus, was behind the assault (however omitting any proof backing up the declare). Due to the seriousness of the incident, a number of safety corporations began to contribute their summaries of the occasions, particularly Sophos, Check Point, Broadcom, Trend Micro, and extra.
Additional, the a part of the assault affecting programs operating macOS was lined intimately in a Twitter thread and a blogpost by Patrick Wardle.
Timeline of occasions

Determine 1. Timeline of occasions associated to the preparation and distribution of 3CX trojanized functions
The timeline exhibits that the perpetrators had deliberate the assaults lengthy earlier than execution; as early as December 2022. This implies they already had a foothold inside 3CX’s community late final 12 months.
Whereas the trojanized 3CX macOS software exhibits it was signed in late January, we didn’t see the dangerous software in our telemetry till February 14th, 2023. It’s unclear whether or not the malicious replace for macOS was distributed previous to that date.
Though ESET telemetry exhibits the existence of the macOS second-stage payload as early as February, we didn’t have the pattern itself, nor metadata to tip us off about its maliciousness. We embrace this data to assist defenders decide how far again programs might need been compromised.
A number of days earlier than the assault was publicly revealed, a mysterious Linux downloader was submitted to VirusTotal. It downloads a brand new Lazarus malicious payload for Linux and we clarify its relationship to the assault later within the textual content.
Attribution of the 3CX supply-chain assault to Lazarus
What’s already revealed
There may be one area that performs a big function in our attribution reasoning: journalide[.]org. It’s talked about in among the vendor experiences linked above, however its presence isn’t defined. Curiously, articles by SentinelOne and ObjectiveSee don’t point out this area. Neither does a blogpost by Volexity, which even kept away from offering attribution, stating “Volexity can not at the moment map the disclosed exercise to any risk actor”. Its analysts have been among the many first to analyze the assault in depth and so they created a device to extract a listing of C&C servers from encrypted icons on GitHub. This device is beneficial, because the attackers didn’t embed the C&C servers immediately within the intermediate phases, however moderately used GitHub as a useless drop resolver. The intermediate phases are downloaders for Home windows and macOS that we denote as IconicLoaders, and the payloads they get as IconicStealer and UpdateAgent, respectively.
On March 30th, Joe Desimone, a safety researcher from Elastic Security, was among the many first to supply, in a Twitter thread, substantial clues that the 3CX-driven compromises are in all probability linked to Lazarus. He noticed {that a} shellcode stub prepended to the payload from d3dcompiler_47.dll is just like AppleJeus loader stubs attributed to Lazarus by CISA again in April 2021.
On March 31st it was being reported that 3CX had retained Mandiant to supply incident response companies regarding the supply-chain assault.
On April 3rd, Kaspersky, by way of its telemetry, confirmed a direct relationship between the 3CX supply-chain victims and the deployment of a backdoor dubbed Gopuram, each involving payloads with a standard identify, guard64.dll. Kaspersky knowledge exhibits that Gopuram is linked to Lazarus as a result of it coexisted on sufferer machines alongside AppleJeus, malware that was already attributed to Lazarus. Each Gopuram and AppleJeus have been noticed in assaults in opposition to a cryptocurrency firm.
Then, on April 11th, the CISO of 3CX summarized Mandiant’s interim findings in a blogpost. In line with that report, two Home windows malware samples, a shellcode loader known as TAXHAUL and a posh downloader named COLDCAT, have been concerned within the compromise of 3CX. No hashes have been offered, however Mandiant’s YARA rule, named TAXHAUL, additionally triggers on different samples already on VirusTotal:
- SHA-1: 2ACC6F1D4656978F4D503929B8C804530D7E7CF6 (ualapi.dll),
- SHA-1: DCEF83D8EE080B54DC54759C59F955E73D67AA65 (wlbsctrl.dll)
The filenames, however not MD5s, of those samples coincide with these from Kaspersky’s blogpost. Nevertheless, 3CX explicitly states that COLDCAT differs from Gopuram.
The following part accommodates a technical description of the brand new Lazarus malicious Linux payload we lately analyzed, in addition to the way it helped us strengthen the prevailing hyperlink between Lazarus and the 3CX compromise.
Operation DreamJob with a Linux payload
The Lazarus group’s Operation DreamJob entails approaching targets by way of LinkedIn and tempting them with job presents from trade leaders. The identify was coined by ClearSky in a paper revealed in August 2020. That paper describes a Lazarus cyberespionage marketing campaign focusing on protection and aerospace corporations. The exercise has overlap with what we name Operation In(ter)ception, a sequence of cyberespionage assaults which have been ongoing since no less than September 2019. It targets aerospace, navy, and protection corporations and makes use of particular malicious, initially Home windows-only, instruments. Throughout July and August 2022, we discovered two situations of Operation In(ter)ception focusing on macOS. One malware pattern was submitted to VirusTotal from Brazil, and one other assault focused an ESET consumer in Argentina. A number of weeks in the past, a local Linux payload was discovered on VirusTotal with an HSBC-themed PDF lure. This completes Lazarus’s means to focus on all main desktop working programs.
On March 20th, a consumer within the nation of Georgia submitted to VirusTotal a ZIP archive known as HSBC job supply.pdf.zip. Given different DreamJob campaigns by Lazarus, this payload was in all probability distributed by way of spearphishing or direct messages on LinkedIn. The archive accommodates a single file: a local 64-bit Intel Linux binary written in Go and named HSBC job supply․pdf.
Curiously, the file extension isn’t .pdf. It’s because the obvious dot character within the filename is a leader dot represented by the U+2024 Unicode character. The usage of the chief dot within the filename was in all probability an try and trick the file supervisor into treating the file as an executable as a substitute of a PDF. This might trigger the file to run when double-clicked as a substitute of opening it with a PDF viewer. On execution, a decoy PDF is exhibited to the consumer utilizing xdg-open, which is able to open the doc utilizing the consumer’s most popular PDF viewer (see Determine 3). We determined to name this ELF downloader OdicLoader, because it has the same function because the IconicLoaders on different platforms and the payload is fetched from OpenDrive.
OdicLoader drops a decoy PDF doc, shows it utilizing the system’s default PDF viewer (see Determine 2), after which downloads a second-stage backdoor from the OpenDrive cloud service. The downloaded file is saved in ~/.config/guiconfigd (SHA-1: 0CA1723AFE261CD85B05C9EF424FC50290DCE7DF). We name this second-stage backdoor SimplexTea.
Because the final step of its execution, the OdicLoader modifies ~/.bash_profile, so SimplexTea is launched with Bash and its output is muted (~/.config/guiconfigd >/dev/null 2>&1).
SimplexTea is a Linux backdoor written in C++. As highlighted in Desk 1, its class names are similar to perform names present in a pattern, with filename sysnetd, submitted to VirusTotal from Romania (SHA-1: F6760FB1F8B019AF2304EA6410001B63A1809F1D). Due to the similarities in school names and performance names between SimplexTea and sysnetd, we imagine SimplexTea is an up to date model, rewritten from C to C++.
Desk 1. Comparability of the unique image names from two Linux backdoors submitted to VirusTotal
guiconfigd |
sysnetd |