Trojanized Windows

Trojanized Windows

Recently, a massive supply chain attack which uses a combination of a trojanized Windows and Mac apps has been unleashed on users of the open source communications platform 3CX. The attack is believed to be launched by an advanced persistent threat group that has created fake update notification pages for the 3CXPhone for Windows and Mac apps.

By attempting to download the latest version of the application, users unknowingly download malicious code which adds a backdoor to the system. This backdoor allows attackers access to the 3CX system and other data stored on the system remotely, without the user ever knowing.

Once the malicious code is installed on their system, the attacker can access their data, including sensitive files and personal information such as passwords and private keys. The attacker can also use the system to install additional malicious code, launching man-in-the-middle (MITM) attacks and possibly taking control of the system.

Given the seriousness of the attack, 3CX users should take precautionary steps to protect their systems and data. Users should always be prudent when downloading software, especially if it is from third-party sources. Where possible, users should download applications only from trusted sources.

In addition, users should download software from legitimate websites and sources only, and make sure it is the most current version. All downloads should be verified via checksums or digital signatures.

It is also important to have proper security on the system and enable automated software updates to ensure all software is up-to-date. Regularly updating the antivirus, firewall, and other security measures are also strongly recommended.

Thanks to the quick action of 3CX in responding to the attack, the malicious code was detected and removed before it had any major impact on its users. Nonetheless, 3CX users should remain vigilant and take steps to protect their systems against supply chain attacks.

Hey Subscribe to our newsletter for more articles like this directly to your email. 

Leave a Reply