Attacks

Advisory Alert: All About the 3CX Desktop App Attack

Table of Contents

The security community recently discovered a dangerous vulnerability in a common communications suite’s desktop app which is currently being exploited by threat actors. Through a 3CX Desktop App attack, threat actors can embed malicious code into legitimate binaries, granting an entry point to the entire network. Our Threat Intelligence Team has discovered approximately 250,000 potentially exposed instances exposed on the internet, including 70,000 in the Americas alone. Given the severity of the risk, security operators that suspect that their networks might be exposed to this attack should take immediate action.

Identifying a 3CX Desktop App Attack in Your Organization

Fortunately, Lumu helps you detect whether your network was breached by an attacker leveraging the 3CX Desktop App Vulnerability. Here’s how you can do it by checking the Compromise View in the Lumu Portal and looking for indicators of compromise (IOCs).

  1. Go to Incidents
  2. Filter by IoC from the list or with the keyword “3CX”
  3. Determine how many endpoints are in contact with the IoCs from the lists
  4. Apply the recommendations provided below

List of IOCs Related to 3CX Desktop App Vulnerabilities

  • msstorageazure[.]com
  • officestoragebox[.]com
  • visualstudiofactory[.]com
  • azuredeploystore[.]com
  • msstorageboxes[.]com
  • officeaddons[.]com
  • sourceslabs[.]com
  • zacharryblogs[.]com
  • pbxcloudeservices[.]com
  • akamaitechcloudservices[.]com
  • azureonlinestorage[.]com
  • msedgepackageinfo[.]com
  • glcloudservice[.]com
  • pbxsources[.]com
  • pbxphonenetwork[.]com
  • sbmsa[.]wiki
  • www[.]journalide[.]org
  • Dunamistrd[.]com
  • azureonlinecloud[.]com
  • akamaicontainer[.]com
  • qwepoi123098[.]com

How to Mitigate the Impact of a 3CX Desktop App Attack

Our threat intelligence team suggests performing the following actions:

  • First, uninstall the 3CX Desktop application. Use the App-like Web (PWA) client instead.
  • Determine if any of the devices on your network has been or is currently in contact with adversaries leveraging 3CX Desktop App vulnerabilities.
  • Perform eradication tasks on endpoints or devices identified as compromised.
  • In 2023 our Threat Intelligence Team is forecasting to see more supply chain attacks like this. With that in mind, make sure you have a Continuous Compromise Assessment® practice across all your third-party providers so you can stop these attacks on time.
  • Contact any of our specialists in case you have any questions on how to respond to this threat.

Stay Ahead of Disruptive Incidents Affecting Your Operations

Remember that cybersecurity attacks—especially ransomware attacks—do not happen randomly. Catastrophic cybersecurity incidents start by exploiting vulnerabilities, like those used in the 3CX Desktop App Attack, for initial access so they can move through the network, escalating privileges, until they can deploy a catastrophic attack. Continuously monitoring anomalous behaviors of devices connected to your network will give you the ability to stop them in time. A compromised network exhibits unusual patterns, which is why it’s crucial to leverage the power of your network metadata to gain visibility into your network’s behavior. Open your Lumu Free Account now.

Recent Posts

  • Blog

Lumu & the MSP Community: 2024 in Review

Reading Time: 4 minsLumu has worked hand-in-hand with MSPs throughout a year that consolidated the…

4 days ago
  • Blog

Reflecting on 2024: Lumu’s Innovations in SecOps

Reading Time: 5 minsLumu’s 2024 SecOps advancements focus on automation and smarter threat detection, with…

6 days ago
  • Attacks

Lumu’s Detection & Response to a Real-World DNS Tunneling Attack

Reading Time: 7 minsThis is the story of a serious DNS tunneling attack on a…

1 week ago
  • Events

Cybersecurity Insights for MSPs: Lessons from IT Nation Connect 2024

Reading Time: 4 minsDiscover the top insights from Lumu’s pre-conference workshop at IT Nation Connect,…

4 weeks ago
  • Stories

Cybersecurity Trends 2025 and Beyond: Navigating AI-Driven Evasion Techniques and Autonomous Threats for Resilient Defense

Reading Time: 2 minsAs we move into 2025, AI-driven evasion and autonomous threats will redefine…

1 month ago
  • Trends

CISA Reveals How 12 Ransomware Gangs are Bypassing EDRs

Reading Time: 7 minsEndpoint Detection and Response (EDR) has a critical role in most companies’…

2 months ago