Attacks

Advisory Alert: All About the 3CX Desktop App Attack

Table of Contents

The security community recently discovered a dangerous vulnerability in a common communications suite’s desktop app which is currently being exploited by threat actors. Through a 3CX Desktop App attack, threat actors can embed malicious code into legitimate binaries, granting an entry point to the entire network. Our Threat Intelligence Team has discovered approximately 250,000 potentially exposed instances exposed on the internet, including 70,000 in the Americas alone. Given the severity of the risk, security operators that suspect that their networks might be exposed to this attack should take immediate action.

Identifying a 3CX Desktop App Attack in Your Organization

Fortunately, Lumu helps you detect whether your network was breached by an attacker leveraging the 3CX Desktop App Vulnerability. Here’s how you can do it by checking the Compromise View in the Lumu Portal and looking for indicators of compromise (IOCs).

  1. Go to Incidents
  2. Filter by IoC from the list or with the keyword “3CX”
  3. Determine how many endpoints are in contact with the IoCs from the lists
  4. Apply the recommendations provided below

List of IOCs Related to 3CX Desktop App Vulnerabilities

  • msstorageazure[.]com
  • officestoragebox[.]com
  • visualstudiofactory[.]com
  • azuredeploystore[.]com
  • msstorageboxes[.]com
  • officeaddons[.]com
  • sourceslabs[.]com
  • zacharryblogs[.]com
  • pbxcloudeservices[.]com
  • akamaitechcloudservices[.]com
  • azureonlinestorage[.]com
  • msedgepackageinfo[.]com
  • glcloudservice[.]com
  • pbxsources[.]com
  • pbxphonenetwork[.]com
  • sbmsa[.]wiki
  • www[.]journalide[.]org
  • Dunamistrd[.]com
  • azureonlinecloud[.]com
  • akamaicontainer[.]com
  • qwepoi123098[.]com

How to Mitigate the Impact of a 3CX Desktop App Attack

Our threat intelligence team suggests performing the following actions:

  • First, uninstall the 3CX Desktop application. Use the App-like Web (PWA) client instead.
  • Determine if any of the devices on your network has been or is currently in contact with adversaries leveraging 3CX Desktop App vulnerabilities.
  • Perform eradication tasks on endpoints or devices identified as compromised.
  • In 2023 our Threat Intelligence Team is forecasting to see more supply chain attacks like this. With that in mind, make sure you have a Continuous Compromise Assessment® practice across all your third-party providers so you can stop these attacks on time.
  • Contact any of our specialists in case you have any questions on how to respond to this threat.

Stay Ahead of Disruptive Incidents Affecting Your Operations

Remember that cybersecurity attacks—especially ransomware attacks—do not happen randomly. Catastrophic cybersecurity incidents start by exploiting vulnerabilities, like those used in the 3CX Desktop App Attack, for initial access so they can move through the network, escalating privileges, until they can deploy a catastrophic attack. Continuously monitoring anomalous behaviors of devices connected to your network will give you the ability to stop them in time. A compromised network exhibits unusual patterns, which is why it’s crucial to leverage the power of your network metadata to gain visibility into your network’s behavior. Open your Lumu Free Account now.

Recent Posts

  • Trends

Introducing Lumu Autopilot: Autonomous Cybersecurity Operations

Reading Time: 5 mins Introducing Lumu Autopilot, the latest innovation that delivers on our promise…

3 weeks ago
  • Attacks

PAN-OS Firewall Vulnerability Advisory: Perimeter Defense Breakdown

Reading Time: 4 mins The Palo Alto Networks PAN-OS firewall vulnerability exemplifies critical flaws in…

4 weeks ago
  • Attacks

ConnectWise ScreenConnect 23.9.8 Advisory Alert: Tool for Vulnerability Check

Reading Time: 2 mins Efficiently confirm and address ConnectWise ScreenConnect vulnerabilities with our guide and…

3 months ago
  • Attacks

LockBit Takedown: Advisory Alert

Reading Time: 7 mins LockBit takedown news and guidance: arrests made, resilience shown, and future…

3 months ago
  • Trends

The Struggle to Afford SOC Analyst Salaries

Reading Time: 3 mins Explore the challenges faced by a wide range of organizations in…

3 months ago
  • Attacks

Infostealers: The Silent Threat Compromising the World One Password at a Time

Reading Time: 7 mins Explore how Infostealers compromise global security, silently stealing data and offering…

3 months ago