
Since the supply chain attack may affect everyone who uses the affected 3CXDesktopApp, and given the number of potential victims worldwide, we took a look at the timelines behind the attack, as well as technical aspects that have not yet been discussed, and present our findings to you in this blog post. The day before, on March 29, the attack was covered by multiple technical analyses from the industry, including the implants for macOS. On March 30, 3CX publicly issued a security alert, stating that at least some of their applications had been Trojanized and delivered via the supply chain to their customers. While several users reported alerts by the middle of March 2023, most believed those were false positives.īased on our initial assessment, the 3CX supply chain operation most likely began at the beginning of fall 2022.

This includes versions used by Windows ® and macOS ® clients.

On March 29, it became publicly known that business communications supplier 3CX had suffered a compromise, with several Trojanized versions of their VOIP software 3CXDesktopApp deployed worldwide.
