Skip to content

3CX was pwned using supply chain attack

A recent hack of the popular communication software 3CX has been attributed to a supply chain attack on a third-party trading software provider. The attack resulted in unauthorized access to 3CX servers and the installation of ransomware on customer devices.

According to reports, the hackers gained access to 3CX’s servers through a vulnerability in a software component provided by a third-party trading software provider. The attackers then installed ransomware on customer devices, demanding payment for its removal.

The incident highlights the risk posed by supply chain attacks, where hackers target vulnerabilities in the software supply chain to gain access to systems downstream. This type of attack is particularly insidious because it allows attackers to bypass traditional security measures and gain access to systems that would otherwise be protected.

Companies can take steps to mitigate the risk of supply chain attacks by carefully vetting third-party software providers and implementing a robust software supply chain security program. This should include regular vulnerability assessments and penetration testing to identify and remediate vulnerabilities before they can be exploited.

In addition to these technical measures, companies should also ensure that their employees are trained to recognize and report suspicious activity, such as phishing emails or unusual login attempts. By taking a comprehensive approach to supply chain security, companies can reduce their risk of falling victim to attacks like the one that targeted 3CX.

In the case of 3CX, the company has stated that it is working to remediate the issue and has advised customers to implement additional security measures, such as two-factor authentication, to protect their systems from further attacks.

Overall, this incident serves as a reminder of the importance of supply chain security and the need for companies to be vigilant in their efforts to protect against this type of attack. By taking a proactive approach to cybersecurity, companies can reduce their risk of falling victim to attacks and ensure the safety and security of their systems and data.

Here you could find technical report by Mandiant, who was hired to investigate this incident https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise