Threat Management, Malware, Supply chain
Supply chain attack hits 3CX VoIP software, drops malware to hosts

The CEO and CISO for 3CX urged network defenders to immediately uninstall the desktop client version of the company’s VoIP software. (Source: Icy Macload via Getty Images)
An ongoing supply chain attack has led to the compromise of 3CX VoIP software installations, leading to the installation of trojanized malware onto the 3CX desktop app to deploy further malicious activities on clients leveraging the vulnerable app.“We regret to inform our partners and customers that our Electron Windows App shipped in Update 7… includes a security issue,” 3CX CISO Pierre Jourdan said in a statement. “Anti-virus vendors have flagged the executable 3CXDesktopApp.exe and in many cases uninstalled it.”“The issue appears to be one of the bundled libraries that we compiled into the Windows Electron App via GIT,” he continued. “We’re still researching the matter to be able to provide a more in depth response later today.”The CEO and CISO for 3CX urged network defenders to immediately uninstall the desktop client. The company is currently working on an update to remediate the issue and recommended customers use the PWA app instead as they work on issuing a new certificate for the app. According to Shodan.io, a site that maps internet-connected devices, there are currently more than 242,519 publicly exposed 3CX phone management systems.Currently, 3CX DesktopApp versions 18.12.407 and 18.12.416 for Windows and Electron Mac App version numbers 18.11.1213, 18.12.402, 18.12.407 & 18.12.416 are also impacted. The company determined that the domains contacted by the compromised library have already been reported and the majority were taken down March 29. Jourdan said that “a GitHub repository which listed them has also been shut down, effectively rendering it harmless.”CrowdStrike’s Falcon OverWatch said its team detected “unexpected malicious activity” that stemmed from a legitimate, signed binary. The activity included “beaconing to actor-controlled infrastructure, deployment of second-stage payloads, and, in a small number of cases, hands-on-keyboard activity.”The founder of the Objective-See Foundation, Patrick Wardle, reverse-engineered the ongoing attack with “a simple triage” and found “xor loops, timing checks, dynamically resolved APIs, and string obfuscations.”In short, “static analysis is going to be painful, and thus not recommended!” Wardle warned. “Continued static analysis appears to show the malware expects to download a 2nd-stage payload. This appears to be saved as ‘UpdateAgent’ in the Application Support/3CX Desktop App/ directory.”Wardle provides a step-by-step analysis of his efforts to reverse engineer the threat, with technical specs and his findings.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds