![]() According to 3CX representatives, the malicious code got into the program because of some unnamed trojanized open-source component that was used by the development team. A number of researchers have dubbed this malicious attack SmoothOperator.Īpparently, trojans are hiding in all versions of the software that were released after March 3 that is, builds 18.12.407 and 18.12.416 for Windows, and and newer for macOS. The list of those users is quite something - consisting of more than 600,000 companies, including well-known brands from all over the world (American Express, BMW, Air France, Toyota, IKEA). Now the cybercriminals are attacking their users via a weaponized application signed with a valid 3CX certificate. Unknown attackers have managed to infect 3CX VoIP applications for both Windows and macOS. Various media sources are reporting a mass supply-chain attack targeting 3CX VoIP telephony system users.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |