Monday, April 03, 2023

Surge in Oil Prices To Maintain Market Stability

 “Officially, the cartel [Opec+ group of countries, which includes major producers Saudi Arabia, Iraq and Russia] wants price stability in oil markets,” said Ipek Ozkardeskaya, a senior analyst at Swissquote Bank. “But in reality, they simply want higher prices.” 

Oil price surges after surprise OPEC+ production cut

Move by world’s largest producers likely to unsettle western nations grappling with inflation

"The oil price surged to $86 a barrel after the world’s largest producers announced a surprise cut in production , a move that is likely to prompt fresh tensions with the US as western governments try to get a grip on inflation.

The Opec+ group of countries, which includes major producers Saudi Arabia, Iraq and Russia, said they would slash production by around 1m barrels a day, accounting for about 3.7% of global demand.

That is on top of existing plans to continue cutting 2m barrels a day – originally agreed in November – until the end of 2023.

The decision caused an immediate spike in Brent crude futures contracts for May, with the international benchmark for oil prices rising more than 7% to $86 a barrel on Monday morning. . ." 


Oil surges as OPEC+ surprise output target cuts shake markets

by 2 million barrels through the
0 of 1 minute, 40 secondsVolume 0%
Oil prices soar after OPEC+ nations' surprise cut
  • OPEC+ cuts output by about 1.16 million bpd
  • Oil posts biggest daily rise in nearly a year
  • Producer group acted after oil hit $70 a barrel
  • Goldman Sachs raises Brent price forecast to $95 for 2023

LONDON, April 3 (Reuters) - Oil prices surged on Monday, posting their biggest daily rise in nearly a year, after a surprise announcement by OPEC+ to cut more production jolted markets.

Brent crude was trading at $84.53 a barrel as of 1115 GMT, up $4.64, or 5.8%, after touching the highest in a month at $86.44.

West Texas Intermediate crude U.S. was at $80.23 a barrel, up $4.56, or 6%, after hitting its highest level since late January..." READ MORE

Videos
Top stories


Sunday, April 02, 2023

3CX Report from Kaspersky

 

www.kaspersky.com

Supply-chain attack on 3CX clients

Editorial Team
4 - 5 minutes

Cybercriminals are attacking 3CX VoIP telephony software users via trojanized applications.

Supply chain attack on 3CX customers

"Various media sources are reporting a mass supply-chain attack targeting 3CX VoIP telephony system users. Unknown attackers have managed to infect 3CX VoIP applications for both Windows and macOS. Now the cybercriminals are attacking their users via a weaponized application signed with a valid 3CX certificate. The list of those users is quite something — consisting of more than 600,000 companies, including well-known brands from all over the world (American Express, BMW, Air France, Toyota, IKEA). A number of researchers have dubbed this malicious attack SmoothOperator.

Apparently, trojans are hiding in all versions of the software that were released after March 3; that is, builds 18.12.407 and 18.12.416 for Windows, and 18.11.1213 and newer for macOS. According to 3CX representatives, the malicious code got into the program because of some unnamed trojanized open-source component that was used by the development team.

The attack via trojanized 3CX software

Citing researchers from various companies, BleepingComputer describes the attack mechanism via a trojanized Windows client as follows:

  • The user either downloads an installation package from the company’s official website and runs it, or receives an update for an already installed program;
  • Once installed, the trojanized program creates several malicious libraries, which are used for the next stage of the attack;
  • The malware then downloads .ico files hosted on GitHub with additional lines of data inside;
  • These lines are then used to download the final malicious payload — the one used to attack end users.

The mechanism for attacking macOS users is somewhat different. You can find its detailed description on the website of the Objective-See non-profit foundation.

What are the hackers after?

The downloaded malware is able to gather information about the system, as well as steal data and save credentials from Chrome, Edge, Brave, and Firefox browsers’ user profiles. In addition, attackers can deploy an interactive command shell, which, theoretically, allows them to do almost anything with the victim’s computer.

Why is this attack is especially dangerous?

The trojanized version of the program is signed with a legitimate 3CX Ltd. certificate issued by DigiCert — the same certificate used in earlier versions of the 3CX program.

Moreover, according to Objective-See, the macOS version of the malware isn’t only signed with a valid certificate, but also notarized by Apple! This means that the application is allowed to run on recent versions of macOS.

>> How to stay safe

The application’s developers recommend urgently uninstalling trojanized versions of the program using the VoIP web client until the update is released.

It’s also wise to conduct a thorough investigation of the incident to make sure that attackers haven’t had time to take over your company’s computers. In general, in order to control what’s happening on the corporate network and to timely detect malicious activity, we recommend using Managed Detection and Response (MDR)-class services.

Tips

How to secure your smart home

If you want your smart home to do more good than harm, you should configure it correctly and secure it adequately. We review smart-home security in detail.

Disable browser synchronization in the office

It’s common practice in many companies to keep work and personal information separate. But browser synchronization often remains unnoticed — and attackers are already exploiting it.

TechDirt Almost an Entire Week > Go/Read more

 

3CX Knew Its App Was Being Flagged By AV Platforms, Did Very Little During Supply Chain Attack

from the whoops dept

"If you don’t use the 3CX VoIP platform, or work in the MSP space with companies that do, you may have missed the news that the company suffered a massive supply chain attack over the past few days. With comparisons being made to the SolarWinds fiasco, this was really, really bad. Unsuspecting clients of 3CX had Windows and Mac versions of the app to hundreds of thousands of customers deployed on their computers with malware snuck inside. That malware called out to actor-controlled servers, which then deployed more malware designed to allow for everything from browser hijacking to remote-takeover of the computer entirely. A hacking group associated with the North Korean government is suspected to be behind all of this.


Security firm CrowdStrike said the infrastructure and an encryption key used in the attack match those seen in a March 7 campaign carried out by Labyrinth Chollima, the tracking name for a threat actor aligned with the North Korean government.

The attack came to light late on Wednesday, when products from various security companies began detecting malicious activity coming from legitimately signed binaries for 3CX desktop apps. Preparations for the sophisticated operation began no later than February 2022, when the threat actor registered a sprawling set of domains used to communicate with infected devices. By March 22, security firm Sentinel One saw a spike in behavioral detections of the 3CXDesktopApp. That same day, 3CX users started online threads discussing what they believed were potential false-positive detections of 3CXDesktopApp by their endpoint security apps.

Here’s the problem with that last paragraph: the detections for the malicious code actually began before Wednesday, March 29th. In an updated ArsTechnica post, it turns out that customers were noting that some AV agents were flagging the 3CX installer and app going all the way back to March 22nd, a week earlier. And these customers were noting this on 3CX’s own community forums.

“Is anyone else seeing this issue with other A/V vendors?” one company customer asked on March 22, in a post titled “Threat alerts from SentinelOne for desktop update initiated from desktop client.” The customer was referring to an endpoint malware detection product from security firm SentinelOne. Included in the post were some of SentinelOne’s suspicions: the detection of shellcode, code injection to other process memory space, and other trademarks of software exploitation.

 


Others were, in fact, seeing the same thing. These customers were busy writing exceptions for the application, figuring that a signed/trusted app from the manufacturer itself was likely resulting in a false negative. Other users followed suit. 3CX remained silent until Tuesday, March 28th.

A few minutes later, a member of the 3CX support team joined in the discussion for the first time, recommending that customers contact SentinelOne since it was that company’s software triggering the warning. Another customer pushed back in response, writing:

Hmmm… the more people using both 3CX and SentinelOne get the same problem. Wouldn’t it be nice if you from 3CX would contact SentinelOne and figure out if this is a false positive or not? – From provider to provider – so at the end, you and the community would know if it is still save and sound?

This is, of course, precisely what should have happened. Instead, the 3CX rep said there were too many AV providers to go out there and call them all. Then he or she mentioned that they don’t control the antivirus software, but instructed the user to “feel free to post your findings” once they had called SentinelOne themselves.

Those findings were on display for everyone the following day when the attack and compromise of 3CX became very, very public.


 

You really would think that after SolarWinds first and Kaseya second, tech companies would know better than to ignore this sort of thing and actually talk to the security firms that are flagging their products."

Filed Under: , , ,
Companies: 3cx

 RELATED CONTENT

4 days ago · A trojanized version of 3CX VoIP desktop app is capable of stealing data from browsers, researchers claim.


Chicago
 
OLDER STUFF
20:05 MLB Tries To Trademark 3 City Names, Runs Away After Law Profs School Them (16)
15:42 Cryptographer Tells European ISPs How EU's Client-Side Scanning Proposal Will Make Everyone Less Safe (10)
12:36 Colorado Eyes Killing State Law Prohibiting Community Broadband Networks (9)
10:49 Senator Warner's RESTRICT Act Is Designed To Create The Great Firewall Of America (58)
10:44 Daily Deal: The Ultimate Advanced Cybersecurity Bundle (0)
09:27 Appeals Court Reverses Awful Decision Finding That Holding Up A Sign Telling Drivers There Are Cops Ahead Is Not Free Speech (19)
05:29 Dish Network Is Still A Hot Mess With 14 Hour Hold Times A Month After Major Cyberattack (11)
20:27 Fifth Circuit Finally Finds A Cop Unworthy Of Immunity, Strips Protection From Officer Who Shot Man Five Times During Routine Traffic Stop (20)
15:31 Elon's Definition Of 'Free Speech Absolutist' Allows Censorship In India, That Twitter Used To Fight (72)
13:29 The Dirty Secret Behind Porn Filtering Laws? Content Filtering Doesn't Work. (48)
12:15 Winnie The Pooh Escapes Copyright Hell, Grabs Some Weapons, And Immediately Gets Kicked Out Of Hong Kong (19)
10:39 As The Social Media Moral Panic Continues, People Keep Highlighting How Much Value It Actually Provides (14)
10:36 Daily Deal: The All-In-One Hardcore Unity Game Developer Bundle With Xbox Ultimate 1-Month Game Pass (0)
09:27 Deputies Who Raided Afroman's House Sue Him For Daring To Turn Footage Of The Raid Into A Viral Video (35)
05:32 Biden FCC Makes Some Empty Noise About Cracking Down On Bullshit Cable & Broadband Fees (5)
20:18 Microsoft Yanked Forthcoming Game's PlayStation Port To Make It Exclusive (29)
15:15 US And EU Nations Request The Most User Data From Tech Companies, Obtain It More Than Two-Thirds Of The Time (4)
13:30 Techdirt Podcast Episode 348: Sci-Fi & Silicon Valley (0)
12:08 Forget Shadow Banning, Now Elon Is Shadow Boosting Accounts He Likes, While Trying To Drive Away Users Who Won’t Pay (106)
10:46 In Internet Speech Cases, SCOTUS Should Stick Up For Reno v. ACLU (112)
10:43 Daily Deal: StackSkills Unlimited (0)
09:31 The Soft Corruption Of Link Tax Bills: Enriching The News Orgs Politicians Want To Endorse Them (10)
05:32 Consumers Aren't Buying Automaker Plans To Make Everything A Subscription (38)
19:57 Gamers Celebrate Their 'Loss' In Court Over Blocking Microsoft's Activision/Blizzard Acquisition (42)
15:37 Elon Musk Effectively Admits That He Set Fire To More Than Half Of Twitter’s Value (140)
13:35 Indian Government Cuts Off Internet Access To 27 Million Punjab Residents As It Continues Its Targeting Of Sikhs (10)
11:58 As Free Speech Enthusiast Elon Plans To Release Twitter’s Source Code, Twitter Desperately Seeking Identity Of FreeSpeechEnthusiast Who Leaked Twitter Source Code (41)
10:48 Greek Government Used Predator Spyware To Spend A Year Surveilling A US Citizen (3)
10:43 Daily Deal: Microsoft Office Pro 2021 (0)
09:36 Publishers Get One Step Closer To Killing Libraries (38)
More arrow

A.I. race should pause for six months, says Elon Musk

How NIMBYs and Bad Priorities Undermine Affordable Housing

Zelensky Calls for a European Army as He Slams EU Leaders’ Response

      Jan 23, 2026 During the EU Summit yesterday, the EU leaders ...