• Security Incident?
  • +31 88 000 2000
  • +31 88 000 2020
  • support@access42.nl
Access42 logoAccess42 logoAccess42 logoAccess42 logo
  • HOME
  • DIENSTEN
    • CYBER DEFENSE CENTER
      • Prepare
      • Detect
      • Prevent
      • Respond
      • Predict
    • DIENSTEN
      • Incident Response
      • Penetratietest (Pentest)
      • Red Teaming aanval
      • Cyber Security Assessment (CSA)
    • MANAGED SERVICES / OPLOSSINGEN
      • CyberTIM
        • CyberTIM Protect
        • CyberTIM Aware
        • CyberTIM Detect voor Microsoft 365
        • Container Security CSI.2030
      • Nessus
      • Active Directory Security
      • Vulnerability Management
        • Vulnerability Management
        • Web App Scanning
        • OT Security
      • Managed Detectie & Response (MDR / XDR)
        • Endpoint Detection & Response (EDR)
        • Mobile Threat Defense
        • Klaar om de controle over Microsoft (Office) 365-beveiliging terug te nemen?
        • AI-powered netwerk detectie en response
        • API Security
      • Phishing & Triage
      • Thinkst Canary
      • E-Mail Security, Continuity & Archiving
        • E-mail Security 3.0
      • Brand Exploit Protect
      • Delinea – Privileged Access Management
      • Security Monitoring / SOC
  • ACCESS42
    • Over ons
      • ISO/IEC 27001 certificering
      • Disclaimer & Privacy Policy
      • Klachtenprocedure
    • Werken bij Access42
    • Partners
  • EVENTS
  • NIEUWS
  • CONTACT
    • Contact
    • Inschrijven Nieuwsbrief
    • Incident Response
            No results See all results
            BUY NESSUS
            ✕
                      No results See all results
                      • Home
                      • Nieuws
                      • Nieuws
                      • CVE-2023-29059: 3CX Desktop App for Windows and macOS actief misbruikt in supply chain aanval

                      CVE-2023-29059: 3CX Desktop App for Windows and macOS actief misbruikt in supply chain aanval

                      30 maart 2023
                      Categories
                      • Nieuws
                      Tags

                      Bron: CrowdStrike, Tenable, Access42, NCSC

                      Op 29 maart 2023 observeerde Falcon OverWatch onverwachte kwaadaardige activiteit afkomstig van een legitieme, ondertekende binary, 3CXDesktopApp – een softphone applicatie van 3CX. De kwaadaardige activiteit omvat beaconing naar actor-gecontroleerde infrastructuur, inzet van second-stage payloads, en, in een klein aantal gevallen, hands-on-toetsenbord activiteit.

                      Weten we welke versies van de 3CX desktop apps kwetsbaar zijn?

                      Vanaf 29 maart, gebaseerd op wat publiekelijk is gedeeld door onderzoekers, worden de volgende versies van de 3CX desktop apps beschouwd als getroffen:

                      Operating SystemVersionFilenameSHA256 (Installer)
                      Windows18.12.4073cxdesktopapp-18.12.407.msiaa124a4b4df12b34e74ee7f6c683b2ebec4ce9a8edcf9be345823b4fdcf5d868
                      Windows18.12.4163cxdesktopapp-18.12.416.msi59e1edf4d82fae4978e97512b0331b7eb21dd4b838b850ba46794d9c7a2c0983
                      macOS18.11.12133CXDesktopApp-18.11.1213.dmg5407cda7d3a75e7b1e030b1f33337a56f293578ffa8b3ae19c671051ed314290
                      macOSlatest3cxdesktopapp-latest.dmge6bbc33815b9f20b0cf832d7401dd893fbc467c800728b5891336706da0dbcec

                      Op 30 maart publiceerde 3CX CISO Pierre Jourdan een blogpost met een lijst van extra getrojaniseerde 3CX desktop app versies voor macOS:

                      • 18.12.402
                      • 18.12.407
                      • 18.12.416

                      Wat doen deze getrojaniseerde versies van de 3CX desktop applicaties?

                      Onderzoekers melden dat de getrojaniseerde applicaties zijn waargenomen:

                      • Connecting back to infrastructure associated with the threat actors
                      • Retrieving and deploying “second-stage payloads”
                      • Hands-on-keyboard activity (limited cases)

                      Volgens nieuw bekendgemaakt onderzoek naar de aanval lijken de payloads van het tweede stadium te zijn gehost op een openbare GitHub-repository die sindsdien is verwijderd.

                      De payloads van het tweede stadium werden gebruikt om een informatiesteler van het derde stadium te downloaden, waardoor aanvallers informatie konden verzamelen zoals de browsergeschiedenis van populaire browsers zoals Google Chrome, Microsoft Edge, Brave en Mozilla Firefox.

                      Wat moet/kan je zelf doen?

                      • 3CX adviseert het softwareprogramma volledig te verwijderen indien update 7 op het systeem aanwezig is.
                      • Wanneer 3CX noodzakelijk is voor een vitaal proces binnen uw organisatie raden zij aan de webapplicatie te gebruiken.
                      • Access42 adviseert organisaties die gebruik maken van 3CX dringend dit advies op te volgen en na het verwijderen van de besmette update grondig onderzoek te doen binnen hun systemen.
                      • Access42 adviseert ook partijen die nog gebruikmaken van een oude(re) versie (update <7) expliciet ook onderzoek te doen naar mogelijke compromittatie van hun systemen en waakzaam te zijn op signalen van mogelijk misbruik.

                      CrowdStrike Falcon Detection and Prevention

                      Het CrowdStrike Falcon-platform beschermt klanten tegen deze aanval en heeft dekking met behulp van op gedrag gebaseerde aanvalsindicatoren (IOA’s) en compromisindicatoren (IOC’s) die gericht zijn op kwaadaardig gedrag in verband met 3CX op zowel macOS als Windows.

                      Klanten moeten ervoor zorgen dat het preventiebeleid correct is geconfigureerd met “Suspicious Processes” ingeschakeld. Onze managed klanten zijn inmiddels gecontroleerd.

                      Heeft Tenable plugins die klanten kunnen gebruiken om kwetsbare versies van de 3CX desktop applicatie te identificeren?

                      Tenable heeft drie plugins uitgebracht:

                      Plugin IDPlugin Name
                      1737123CX DesktopApp Malware
                      1736773CX Desktop App Local Windows Detection
                      1736793CX Desktop App Local macOS Detection

                      Plugin ID 173712 kan worden gebruikt om de versies van 3CX DesktopApp te identificeren die getrojaniseerd zijn. Op dit moment brengen wij actief onze managed klanten op de hoogte over eventuele kwetsbare systemen.

                      Op 30 maart meldde 3CX de release van bijgewerkte versies van de 3CX DesktopApp voor Windows en macOS: versie 18.12.422. Voor meer informatie verwijzen we naar de 3CX blog post.

                      Meer informatie

                      • https://www.3cx.com/community/threads/3cx-desktopapp-security-alert.119951/
                      • https://www.ncsc.nl/actueel/nieuws/2023/maart/30/ncsc-waarschuwt-voor-supplychain-aanval-3cx
                      • https://www.tenable.com/blog/3cx-desktop-app-for-windows-and-macos-reportedly-compromised-in- supply-chain-attack
                      • https://www.crowdstrike.com/blog/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers/
                      • https://tweakers.net/nieuws/208206/windows-app-zakelijke-voip-dienst-3cx-verspreidt-malware-na-supplychainaanval.html
                      Delen
                      0

                      Related posts

                      8 september 2023

                      IDM Europe


                      Read more
                      6 september 2023

                      Security Awareness beschermt je niet tegen aanvallers! 


                      Read more
                      29 augustus 2023

                      Hoe ChatGPT cyberdreigingen transformeert


                      Read more
                      CVE-2023-29059: 3CX Desktop App for Windows and macOS actief misbruikt in supply chain aanval
                      CVE-2023-29059: 3CX Desktop App for Windows and macOS actief misbruikt in supply chain aanval

                      CVE-2023-29059: 3CX Desktop App for Windows and macOS actief misbruikt in supply chain aanval

                      Access42 B.V.
                      Leusderend 38
                      3832RC LEUSDEN

                      CyberDefense Center
                      • Prepare
                      • Detect
                      • Prevent
                      • Respond
                      • Predict
                      Diensten
                      • Phishing as a Service
                      • Penetratietesten
                      • Red Teaming
                      • Nessus
                      • Container Security
                      • OT Security
                      • Vulnerability Management
                      • AI-powered network detection and response
                      • E-mail security
                      • Alle Diensten
                      Over ons
                      • Over Access42
                      • Kernwaarden
                      • Missie en Visie
                      • Werken bij Access42
                      • Partners
                      • Disclaimer en Privacy Policy
                      • Responsible Disclosure
                      Get in touch

                      © 2023 Access42 | Cybersecurity. All Rights Reserved.
                      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
                      Cookie SettingsAccept All
                      Manage consent

                      Privacy Overview

                      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
                      Necessary
                      Altijd ingeschakeld
                      Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
                      CookieDuurOmschrijving
                      _GRECAPTCHA5 months 27 daysThis cookie is set by Google. In addition to certain standard Google cookies, reCAPTCHA sets a necessary cookie (_GRECAPTCHA) when executed for the purpose of providing its risk analysis.
                      cookielawinfo-checkbox-advertisement1 yearThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Advertisement".
                      cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
                      cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
                      cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
                      cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
                      cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
                      CookieLawInfoConsent1 yearRecords the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie.
                      viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
                      Functional
                      Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
                      CookieDuurOmschrijving
                      bcookie2 yearsThis cookie is set by linkedIn. The purpose of the cookie is to enable LinkedIn functionalities on the page.
                      langsessionThis cookie is used to store the language preferences of a user to serve up content in that stored language the next time user visit the website.
                      lidc1 dayThis cookie is set by LinkedIn and used for routing.
                      Performance
                      Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
                      CookieDuurOmschrijving
                      YSCsessionThis cookies is set by Youtube and is used to track the views of embedded videos.
                      Analytics
                      Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
                      CookieDuurOmschrijving
                      _ga2 yearsThis cookie is installed by Google Analytics. The cookie is used to calculate visitor, session, campaign data and keep track of site usage for the site's analytics report. The cookies store information anonymously and assign a randomly generated number to identify unique visitors.
                      _gat_gtag_UA_116473530_11 minuteThis cookie is set by Google and is used to distinguish users.
                      _gat_UA-116473530-11 minuteThis is a pattern type cookie set by Google Analytics, where the pattern element on the name contains the unique identity number of the account or website it relates to. It appears to be a variation of the _gat cookie which is used to limit the amount of data recorded by Google on high traffic volume websites.
                      _gid1 dayThis cookie is installed by Google Analytics. The cookie is used to store information of how visitors use a website and helps in creating an analytics report of how the website is doing. The data collected including the number visitors, the source where they have come from, and the pages visted in an anonymous form.
                      Advertisement
                      Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
                      CookieDuurOmschrijving
                      bscookie2 yearsThis cookie is a browser ID cookie set by Linked share Buttons and ad tags.
                      IDE1 year 24 daysUsed by Google DoubleClick and stores information about how the user uses the website and any other advertisement before visiting the website. This is used to present users with ads that are relevant to them according to the user profile.
                      prism_4768097571 monthUsed by ActiveCampaign to track usage of newsletters
                      test_cookie15 minutesThis cookie is set by doubleclick.net. The purpose of the cookie is to determine if the user's browser supports cookies.
                      VISITOR_INFO1_LIVE5 months 27 daysThis cookie is set by Youtube. Used to track the information of the embedded YouTube videos on a website.
                      yt-remote-connected-devicesneverYouTube sets this cookie to store the video preferences of the user using embedded YouTube video.
                      yt-remote-device-idneverYouTube sets this cookie to store the video preferences of the user using embedded YouTube video.
                      Others
                      Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
                      CookieDuurOmschrijving
                      AnalyticsSyncHistory1 monthNo description
                      CONSENT16 years 7 months 5 days 13 hoursNo description
                      li_gc2 yearsNo description
                      UserMatchHistory1 monthLinkedin - Used to track visitors on multiple websites, in order to present relevant advertisement based on the visitor's preferences.
                      OPSLAAN & ACCEPTEREN
                      Aangedreven door CookieYes Logo
                      Aanvraag CyberTIM Detect voor Microsoft 365 Trial

                        Download de gratis whitepaper!

                         

                          Inschrijven Webinar Vectra

                            Inschrijving Webinar Cofense

                              Inschrijven Webinar CrowdStrike

                                Start de Mimecast Service vandaag nog!

                                  Start met de Cognito Detect for Microsoft 365 Free Service

                                    Download de Tenable.OT Solution Brief

                                    Name *

                                    Email *


                                    Prijslijst aanvragen

                                     

                                      Meer weten over onze diensten?