Caution When Using 3CX DesktopApp (CVE-2023-29059)
Overview
Details about how supply chains were attacked through the 3CX DesktopApp were published. [1] This software provides users with various communication functions, such as voice calls and video conferences, and can be operated on both Windows and MAC operating systems. Currently, the 3CX company is preparing to issue a new certificate, and until then, they are instructing users to use an alternative software.
Description
Regarding this, the distributed malware are confirmed to include modules that perform malicious functions and are in the form of installation files such as MSI and DMG. 3CXDesktopApp.exe loads the malicious ffmpeg.dll module, and then loads d3dcompiler.dll as well to execute it in the memory. The malware executed in the memory is a downloader malware which is known to ultimately download and execute an Infostealer.
Affected Products
Electron Windows application shipped in Update 7 18.12.407 18.12.416 Electron macOS application 18.11.1213 18.12.402 18.12.407 18.12.416
Solution
[1] Uninstall 3CX DesktopApp
- Guide for Windows: Windows Key > Type “Control Panel” > Programs and Applications > Right click “3CX Desktop App” > Uninstall
[2] 3CX recommends using the PWA application instead
- PWA installation guide: https://www.3cx.com/blog/releases/web-client-pwa/
Detection Information
[File Detection] Dropper/MSI.Agent Trojan/Win.Loader.C5403102 Trojan/Win.Agent.C5403110 Trojan/Win.Loader.C5403103 Infostealer/Win.Agent.C5403954 Trojan/BIN.Agent Data/BIN.Encoded Trojan/OSX.Agent Trojan/OSX.Loader [Behavior Detection] Connection/MDP.Event.M4581 Connection/MDP.Event.M11026 Exploit/MDP.Event.M11027
[References]
1) Manufacturer’s notice: https://www.3cx.com/blog/news/desktopapp-security-alert/ 2) CVE-2023-29059: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29059 3) CWE-506: https://cwe.mitre.org/data/definitions/506.html