Scenario

A large multinational corporation heavily relies on the 3CX software for phone communication, making it a critical component of their business operations. After a recent update to the 3CX Desktop App, antivirus alerts flag sporadic instances of the software being wiped from some workstations while others remain unaffected. Dismissing this as a false positive, the IT team overlooks the alerts, only to notice degraded performance and strange network traffic to unknown servers. Employees report issues with the 3CX app, and the IT security team identifies unusual communication patterns linked to recent software updates.

As the threat intelligence analyst, it's your responsibility to examine this possible supply chain attack. Your objectives are to uncover how the attackers compromised the 3CX app, identify the potential threat actor involved, and assess the overall extent of the incident.

https://cyberdefenders.org/blueteam-ctf-challenges/3cx-supply-chain/

after downloading the ZIP file then

Get-FileHash .\\3CXDesktopApp-18.12.416.msi

we got the hash :

59E1EDF4D82FAE4978E97512B0331B7EB21DD4B838B850BA46794D9C7A2C0983


1- Understanding the scope of the attack and identifying which versions exhibit malicious behavior is crucial for making informed decisions if these compromised versions are present in the organization. How many versions of 3CX running on Windows have been flagged as malware?

2

Screenshot 2025-07-08 051302.png

i did some research and found this article from HUNTRESS by John Hammond

https://www.huntress.com/blog/3cx-voip-software-compromise-supply-chain-threats

2- Determining the age of the malware can help assess the extent of the compromise and track the evolution of malware families and variants. What's the UTC creation time of the .msi malware?

2023-03-13 06:33

Screenshot 2025-07-08 051437.png