iTnews Asia
  • Home
  • News
  • Security

Popular softphone weaponised in supply chain attack

Popular softphone weaponised in supply chain attack

Uninstall 3CX Electron, switch to web version.

By Richard Chirgwin on Apr 3, 2023 10:09AM

Business telephony vendor 3CX is warning users of its softphone to uninstall the software and switch to its equivalent web app, following what it calls a supply-chain attack.

CEO Nick Galea posted that the malware “affects the Windows Electron client for customers running update 7."

“It was reported to us [last] night and we are working on an update to the DesktopApp which we will release in the coming hours," he wrote.

“We strongly recommend using our PWA client instead. It really does 99 percent of the client app and is fully web-based and this type of thing can never happen."

Galea also said that Windows Defender users will already have noticed the app has been uninstalled.

The malware was discovered independently by SentinelOne and CrowdStrike.

SentinelOne said it first noticed malicious activity originating from the 3CX software on March 22.

“The trojanised 3CXDesktopApp is the first stage in a multi-stage attack chain that pulls ICO files appended with base64 data from GitHub and ultimately leads to a third stage infostealer DLL still being analysed as of the time of writing," SentinelOne said.

CrowdStrike said it observed similar behaviour on March 29.

The malicious activity, CrowdStrike said, emanated from “a legitimate, signed binary, 3CXDesktopApp”.

The activity “includes beaconing to actor-controlled infrastructure, deployment of second-stage payloads, and, in a small number of cases, hands-on-keyboard activity," it said.

“CrowdStrike Intelligence has assessed there is suspected nation-state involvement by the threat actor LABYRINTH CHOLLIMA,” the company said.

On its website, 3CX claims it has 600,000 business customers and 12 million daily users.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
3cx security security vulnerability

Related Articles

  • Your organisation’s physical security can be a gateway for cybercriminals
  • The best way to outsmart your threat actors is to think like one
  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

Your organisation’s physical security can be a gateway for cybercriminals

Your organisation’s physical security can be a gateway for cybercriminals

What are the most pressing cyber security concerns going into 2025?

What are the most pressing cyber security concerns going into 2025?

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.