3CX has advised customers running affected versions to uninstall the software and use the browser-based web app until a new version is available. Credit: Shutterstock/Jaiz Anuar The UK’s National Cyber Security Centre (NCSC) has advised all UK businesses to take action over a severe security issue in the 3CX DesktopApp that threat actors are actively exploiting. The issue came to light last week when 3CX CEO Nick Galea announced that the 3CX DesktopApp has malware in it that affects the Windows Electron client for customers running update 7.The exploit was reported to 3CX by security researchers at Sophos, Crowdstrike, and SentinelOne. The vendor published a security alert which advises customers running affected versions to uninstall the software and use the browser-based web app PWA until a new version is available. The NCSC strongly urged all UK organizations running this software to consult the vendor advisory and take the recommended actions in it.3CX is a Voice Over Internet Protocol (VoIP) IPBX software development company. The 3CX DesktopApp allows users to make calls, chat, video conference, and check voicemail using their desktop.Researchers discover 3CX supply chain attackResearchers observed malicious activity originating from a Trojanized version of the 3CX DesktopApp. “The software is a digitally signed version of the softphone desktop client for Windows and is packaged with a malicious payload,” Sophos said in a blog post. A threat actor has abused the application to add an installer that communicates with command-and-control servers, Sophos said. “The Trojanized 3CXDesktopApp is the first stage in a multi-stage attack chain that pulls ICO files appended with base64 data from GitHub and ultimately leads to a third-stage infostealer DLL still being analyzed as of the time of writing,” SentinelOne said. CrowdStrike discovered that the malicious activity includes beaconing to actor-controlled infrastructure, deployment of second-stage payloads, and hands-on-keyboard activity.The information stealer can gather system information and sensitive data stored in Google Chrome, Microsoft Edge, Brave, and Mozilla Firefox browsers. 3CX has appointed Mandiant cybersecurity firm to help it review this incident in full. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe