• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News

‘Cascading Supply Chain Compromise’ Led to 3CX Compromise

The malicious activity that led to the supply chain attacks leveraging the 3CX desktop app was actually another supply chain compromise.

April 20, 2023 Zachary Comeau Leave a Comment

3CX Hack Supply Chain attack compromise
stock.adobe.com/Sashkin

The compromise that led to the supply chain attack leveraging the 3CX desktop app was actually another supply chain compromise, according to cybersecurity forensics firm Mandiant.

The Google-owned company published a blog detailing the supply chain compromise that affected the 3CX desktop app, which was allegedly perpetrated by a North Korean entity. However, the 3CX compromise was made possible via malicious software that was downloaded from Trading Technologies, a provider of futures trading software.

According to the company, the culprit was a malware-laced software package distributed via an earlier software supply chain compromise that began with a tampered installer for X_TRADER, a software package from Trading Technologies.

The download of that software led to the deployment of a malicious modular backdoor that Mandiant calls VEILEDSIGNAL. The X_TRADER platform was discontinued in 2020, but it was still available for download from the Trading Technologies website in 2022, Mandiant says.

In a blog, 3CX acknowledged that an employee downloaded the malicious Trading Technologies package to their personal computer. With the VEILEDSIGNAL backdoor installed, the threat actor was able to maintain persistence on the employee’s personal machine.

From there, the employee’s corporate credentials were stolen and used to access the corporate VPN just two days after the initial compromise of the employee’s personal computer.

According to Mandiant and 3CX, the threat actor used the Fast Reverse Proxy tool to move laterally within the 3CX environment, eventually compromising both the Windows and macOS build environments using additional malware deployments.

In response to the attacks, 3CX developed a seven-step security action plan that includes:

  • Hardening multiple layers of network security
  • Revamping build security
  • Product security reviews with Mandiant
  • Enhancing product security features
  • Ongoing penetration testing
  • Refining crisis management and alert handling plans
  • Establishing a new department for network operations and security

The compromise of 3CX was first disclosed in late March, with malicious activity involving the company’s desktop app including communicating with hacker-controlled infrastructure, deployment of second-stage payloads and some hands-on-keyboard activities.

Researchers say those payloads were used to download a third-stage information stealer that allowed attackers to collect information from popular web browsers such as Google Chrome, Microsoft Edge, brace and Mozilla Firefox.

According to Mandiant, this type of “cascading software supply chain compromise” such as this can be potentially devastating and reach a large number of victims.

“The identified software supply chain compromise is the first we are aware of which has led to a cascading software supply chain compromise,” the firm says. “It shows the potential reach of this type of compromise, particularly when a threat actor can chain intrusions as demonstrated in this investigation.”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: 3CX, Cybersecurity, Mandiant, Supply Chain Attacks

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.