April 12, 2023 Breach

A Historic First in Supply Chain Security

In March 2023, security researchers at CrowdStrike and Mandiant uncovered what they described as the first publicly documented instance of one supply chain attack directly causing another. The 3CX desktop application, a widely used VoIP and video conferencing client, had been trojanized through its official build process. But the root cause was not a compromise of 3CX's own infrastructure — it was traced back to a separate, earlier supply chain attack on Trading Technologies, a financial software firm. This cascading chain-of-compromise represents a new paradigm in third-party risk management.

The Attack Chain

Step 1: The X_TRADER Compromise

The attack began when the North Korean state-sponsored threat group known as Lazarus Group (also tracked as UNC4736 by Mandiant) compromised Trading Technologies' X_TRADER software, a professional trading terminal. The attackers trojanized the X_TRADER installer, inserting a backdoor that was signed with a legitimate Trading Technologies code-signing certificate. X_TRADER had been officially decommissioned in April 2020, but the compromised installer remained available for download, and some users continued to install it.

Step 2: The 3CX Employee's Machine

A 3CX employee downloaded and installed the compromised X_TRADER application on their personal computer. The backdoor in X_TRADER gave the Lazarus Group access to the employee's machine, from which they were able to harvest corporate credentials. Using those credentials, the attackers gained access to 3CX's build environment.

Step 3: The 3CX Desktop App Trojanization

With access to 3CX's build infrastructure, the attackers inserted malicious code into the 3CX Desktop App for both Windows and macOS. The trojanized versions were distributed through 3CX's official update mechanism beginning in late March 2023. The malware-laden applications were signed with 3CX's legitimate code-signing certificate, making them appear trustworthy to endpoint security tools and users.

The malicious code was designed to contact attacker-controlled command-and-control servers, download additional payloads, and potentially deploy information-stealing malware on victim systems. CrowdStrike detected the activity on March 29, 2023, and published an advisory identifying the compromised versions.

Scale of Potential Impact

3CX stated that its phone system was used by more than 600,000 companies and 12 million daily users worldwide, with customers including major enterprises, government agencies, and healthcare organizations. While the actual number of organizations that installed the trojanized version and were further compromised remains smaller than the total customer base, the potential blast radius was enormous.

Factor Detail
Threat Actor Lazarus Group (North Korea) / UNC4736
Initial Vector Trojanized X_TRADER installer from Trading Technologies
Second Vector Trojanized 3CX Desktop App via official update channel
3CX Customer Base 600,000+ companies, 12 million+ daily users
Platforms Affected Windows and macOS
Historical Significance First known supply-chain-causes-supply-chain attack
TPRM Lesson Learned: The 3CX incident proves that supply chain attacks can cascade: a compromise of Vendor A (Trading Technologies) can lead to a compromise of Vendor B (3CX) and then expose Vendor B's entire customer base. Traditional TPRM assessments that evaluate each vendor in isolation fail to capture this cascading risk. Organizations must consider what software their vendors use, what software their vendors' employees use, and how their vendors' build and distribution systems are protected. The concept of nth-party risk is no longer theoretical — it is an observed, documented attack path.

Why This Changes Third-Party Risk Management

Applying FAIR to Cascading Supply Chain Risk

Modeling cascading supply chain attacks with FAIR requires treating the initial vendor compromise as a threat event that changes the threat landscape for all downstream vendors. The contact frequency and probability of action for downstream compromises become conditional on the upstream breach. This creates a correlated risk scenario that organizations must model explicitly — a single upstream vendor compromise can simultaneously elevate the risk across dozens of downstream vendor relationships. FAIR's decomposition approach is well-suited to this analysis because it allows organizations to model each link in the chain separately and then assess the combined probability and magnitude.

Protect Your Organization from Third-Party Risk

Fair TPRM is a free, open-source platform for vendor risk management, GRC compliance, and FAIR risk quantification.

Free Demo Download Source

Sources & References

  1. 3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise - Mandiant
  2. CrowdStrike Detects and Prevents Active Intrusion Campaign Targeting 3CXDesktopApp Customers - CrowdStrike
  3. 3CX DesktopApp Security Alert - 3CX Official Advisory
  4. Supply Chain Attack Against 3CXDesktopApp - CISA Alert
  5. X_Trader Supply Chain Attack Affects Critical Infrastructure - Symantec Threat Intelligence