Security Advisories / Bulletins / vendors Responses linked to 3CX compromise event
- 3CX evolved from its roots as a PBX phone system to a complete communications platform, offering customers a simple, flexible, and affordable solution to call, video and live chat.
- Per several report the building environment of 3CX for the DesktopApp (MAC & Windows) has been compromised
- The recent releases (details given below) have been compromised to include malicious code inside it
- More details available regarding the compromise with the graphics by Thomas Roccia:
- 3CX Supplychain Attack Windows
- 3CX Supplychain Attack Apple
- Per 3CX website, likely numbers not updated:
- 190 Countries
- 600K+ installations
- 12M+ users
- You can check the dedicated website :
- https://checkmyoperator.com/
- NOTA: You also need to check manually the compromise!
- The following releases & platforms are affected
- Microsoft / Electron Windows App shipped in Update 7, version numbers 18.12.407 & 18.12.416.
- Mac / Electron Mac App version numbers 18.11.1213, 18.12.402, 18.12.407 & 18.12.416 are also affected.
- Unusual thing, a CVE number been assigned to this attack based on CWE-506.
- CVE NVD Link : https://nvd.nist.gov/vuln/detail/CVE-2023-29059
- 3CX DesktopApp Security Alert
- 3CX DesktopApp Security Alert - Mandiant Appointed to Investigate
- Chrome blocks latest 3CX MSI installer
- https://www.3cx.com/community/threads/threat-alerts-from-sentinelone-for-desktop-update-initiated-from-desktop-client.119806/
- https://www.3cx.com/community/threads/crowdstrike-endpoint-security-detection-re-3cx-desktop-app.119934/
- Thanks to Crowdstrike for the burn of this with their Reddit post they did the right thing.
- https://www.crowdstrike.com/blog/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers/
- https://www.reddit.com/r/crowdstrike/comments/125r3uu/20230329_situational_awareness_crowdstrike/
- https://www.trendmicro.com/en_us/research/23/c/information-on-attacks-involving-3cx-desktop-app.html
- https://www.nextron-systems.com/2023/03/31/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise/
- https://twitter.com/nextronsystems/status/1643147003155587072
- If you want to add a link, comment or send it to me
- Feel free to report any mistake directly below in the comment or in DM on Twitter @SwitHak