#3CXDesktopApp

2025-07-03

"3CX’s Software Supply Chain Compromise: Lessons Learned" published by ReversingLabs. #3CXDesktopApp, #Lazarus, #DPRK, #CTI reversinglabs.com/blog/lessons

2025-01-09

"That's a lot of Single Points of Failure" published by Tay. #3CXDesktopApp, #Hyperliquid, #Lazarus, #Radiant, #DPRK, #CTI archive.is/82lZ3

2023-11-23

"ROK-UK Joint Cyber Security Advisory(DPRK S/W supply chain attacks)" published by KRNCSC. #3CXDesktopApp, #News, #MagicLine4NX, #CTI, #OSINT, #LAZARUS ncsc.go.kr:4018/main/cop/bbs/s

2023-08-17

"Mac-ing Sense of the 3CX Supply Chain Attack: Analysis of the macOS Payloads" published by Objecive-see. #SmoothOperator, #3CXDesktopApp, #CTI, #OSINT, #LAZARUS speakerdeck.com/patrickwardle/

2023-04-03

Tools, Code Used to Hack 3CX Desktop Confirm Lazarus Cyberespionage Group's Involvement bankinfosecurity.com/north-kor The shellcode sequence appears to have been only used in the ICONIC loader and the APPLEJEUS malware, which is known to be linked to Lazarus. Prajeet Nair #lazarus #nkorea #3cxdesktopapp

Percherie OnDaNetpercherie@framapiaf.org
2023-03-31

@sebsauvage
Corruption de la chaîne d'approvisionnement chez l'éditeur de softphone #3cx

Plusieurs utilisateurs indiquent que leurs mot de passe stocke dans leur navigateur ont été volé et utilisé
Les DSI de grosse entreprise comme Pepsi et Mercedes sont très remonté

Le temps de valider l'alerte chez nous, désinstallation en catastrophe de #3cxdesktopapp sur l'ensemble du parc en attendant lundi
#3cxapocalypse

huntress.com/blog/contextualiz

2023-03-31

For any #3CX #3CXDesktopApp users - a reminder to MOVE AWAY FROM the Electron-based desktop app, and migrate to the browser variant (PWA) ASAP for continuity of operations while satisfying security concerns!
3cx.com/blog/news/pwa-vs-windo

2023-03-31

Originally posted by The Hacker News / @TheHackersNews: nitter.platypush.tech/TheHacke

R to @TheHackersNews: The attack appears to have compromised 3CX's software build pipeline to distribute Windows and #macOS versions of the app package or poisoned an upstream dependency. The scale of the attack is currently unknown. 🔎

#cybersecurity #3CX #3CXpocalypse #3CXDesktopApp

2023-03-31

So it looks like MacOS versions of #3CXDesktopApp were dorked potentially as early as January - but reporting from CyberScoop (cyberscoop.com/3cx-supply-chai) indicates there were only a few thousand MacOS installs. When the Windows version debuted in March, the dorked update would've gone out to tens if not hundreds of thousands of endpoints quickly. Unlike incidents such as Kaseya where automated actions led to scripted ransomware deployment, #3CX compromise appears to prep for interactive post-access ops.

WTF would you do if suddenly you had 10-100k compromised endpoints and no easy way to quickly triage them?

If this was #DPRK or #Lazarus affiliated, this is the second time they shot themselves in the dick after Wannacry.

#CTI #ThreatIntel

2023-03-30

The first reflective loader used in the 3CX supply chain attack is based on sRDI (DAVESHELL). Here is an Intezer gene analysis of the shellcode: analyze.intezer.com/analyses/7

Here is the DLL it loads: analyze.intezer.com/analyses/e

Some of the "additional code" that was added to ffmpeg was extracted and analyzed here: analyze.intezer.com/analyses/1. Under the code tab, you generate a yara rule that can be used to hunt for similar compromised files.

#malware #threatintelligence #3cx #3CXDesktopApp

2023-03-30

📢 SentinelOne has dubbed the attack "Smooth Operator," while CrowdStrike suspects the involvement of a North Korean government-state actor known as LABYRINTH CHOLLIMA.

Read more: hackread.com/3cx-desktop-app-s

#Security #3CX #3CXDesktopApp #CyberAttack #Cybersecurity

2023-03-30

Referenced link: thehackernews.com/2023/03/3cx-
Discuss on discu.eu/q/https://thehackerne

Originally posted by The Hacker News / @TheHackersNews: nitter.platypush.tech/TheHacke

⚠️ 🚨 Active supply chain attack targets popular voice and video conferencing software #3CXDesktopApp, affecting hundreds of well-known brands and millions of users.

Learn more: thehackernews.com/2023/03/3cx-

#cybersecurity #hacking #infosecurity

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst