Earlier this week it was confirmed that a major software supply chain attack took place involving 3CX’s VoIP system. The desktop application was hijacked to deliver malicious code via an update file, potentially affecting over 600,000 organisations.
While we have no affiliation with the 3CX solutions, we are actively monitoring the incident to support our customers and protect ourselves. This incident is still in the forensic stage, the end-goal of this attack is still being determined.
What we do know at this point is our products and solutions have not been affected. But we appreciate this will be an incredibly stressful experience for any users who have been affected.
We want to ensure that every organisation can stay safe and avoid the damage that can be caused from cyberattacks like these, so please read on for our step guidance on what to do if you are affected.
If you or your organisation are users of the 3CX phone system, assume you have been compromised.
We have assessed the incident and advise you follow the remedial actions below as soon as possible.
Electron App (as advised by 3CX)
Evidence Retention
Do not switch off any infected machine as this may remove evidence needed to analyse an attack and take remediation action.
3CX has advised that if you are running 3CX on a self-hosted or on-premises server, ensure it has the latest update installed, check their website for more information.
If you need urgent assistance to deal with a cyberattack, contact the Check Point Incident Response Service. You do not be an existing customer and will not be charged for the first hour of triage.
Phone number: 0-800-088-5471
(Visit the Check Point Incident Response page for other numbers)
Email: emergency-response@checkpoint.com
If you would like to speak to us directly, please get in touch via the link below for a no strings attached call to discuss your security framework.