3CX Supply Chain Attack Network Indicators
Compromise Software Supply Chain
Compromise Software Supply Chain
Domain Generation Algorithms
Domain Generation Algorithms
DNS, Application Layer Protocol
Protocol Tunneling, Proxy, Web Service
Exfiltration Over Unencrypted Non-C2 Protocol
Exfiltration Over Unencrypted Non-C2 Protocol, Exfiltration Over Alternative Protocol
Drive-by Compromise
Exploitation for Client Execution
Exfiltration Over Unencrypted Non-C2 Protocol
Spearphishing via Service
Exfiltration Over Unencrypted Non-C2 Protocol
DNS, Application Layer Protocol
Network Denial of Service, Reflection Amplification