Security News > 2024 > May > JAVS courtroom recording software backdoored in supply chain attack
Attackers have backdoored the installer of widely used Justice AV Solutions courtroom video recording software with malware that lets them take over compromised systems.
JAVS has since removed the compromised version from its official website, saying that the trojanized software containing a malicious fffmpeg.
"We confirmed all currently available files on the JAVS.com website are genuine and malware-free. We further verified that no JAVS Source code, certificates, systems, or other software releases were compromised in this incident."
Cybersecurity company Rapid7 investigated this supply chain incident and found that the S2W Talon threat intelligence group first spotted the trojanized JAVS installer in early April and linked it to the Rustdoor/GateDoor malware.
According to Rapid7, the backdoored installer-classified by many security vendors as a malware dropper-was downloaded from the official JAVS website.
In March last year, video conferencing software maker 3CX disclosed that its 3CXDesktopApp Electron-based desktop client was also trojanized in a similar attack by a North Korean hacking group tracked as UNC4736 to distribute malware.
News URL
Related news
- Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems (source)
- LottieFiles hit in npm supply chain attack targeting users' crypto (source)
- LottieFiles hacked in supply chain attack to steal users’ crypto (source)
- LottieFiles supply chain attack exposes users to malicious crypto wallet drainer (source)