3CX: Difference between revisions
Removed unneccesary info about company founder, and rectified article notices |
added sources. reworked stuff (most of the page need some form of restructuring) |
||
Line 1: | Line 1: | ||
{{SloppyAI}} | {{SloppyAI}} | ||
{{StubNotice}} | {{StubNotice}} | ||
3CX, Inc., is a software development company and developer of the 3CX Phone System. | 3CX, Inc., is a software development company and developer of the 3CX Phone System<ref name=":0">{{Cite web |last=3CX |title=ENTERPRISE GRADE PHONE SYSTEM |url=https://www.3cx.com/phone-system/ |archive-url=https://web.archive.org/web/20250813032918/https://www.3cx.com/phone-system/ |archive-date=2025-08-12 |access-date=2025-08-12 |website=3cx.com}}</ref>. | ||
The 3CX Phone System is a software private branch exchange based on the SIP (Session Initiation Protocol) standard to allow calls via the public switched telephone network (PSTN) or via Voice over Internet Protocol (VoIP) services. | The 3CX Phone System is a software private branch exchange based on the SIP (Session Initiation Protocol) standard to allow calls via the public switched telephone network (PSTN) or via Voice over Internet Protocol (VoIP) services <ref name=":0" />. | ||
In 2023, during a major supply chain attack affecting the 3CX desktop application, company's public response included engaging cybersecurity firm Mandiant | In 2023, during a major supply chain attack affecting the 3CX desktop application, company's public response included engaging the services of Google-owned cybersecurity firm Mandiant<ref>{{Cite web |last=Lakshmanan |first=Ravie |date=Mar 31, 2023 |title=3CX Supply Chain Attack — Here's What We Know So Far |url=https://thehackernews.com/2023/03/3cx-supply-chain-attack-heres-what-we.html |archive-url=https://thehackernews.com/2023/03/3cx-supply-chain-attack-heres-what-we.html |archive-date=June 27, 2025 |access-date=2025-08-12 |website=hehackernews.com}}</ref> and advising customers to uninstall affected versions. | ||
==Controversies== | ==Controversies== | ||
====Customer and Partner Relations==== | ====Customer and Partner Relations==== | ||
The company's CTO, Nick Galea, has been the subject of criticism from some 3CX users and partners for alleged heavy-handed moderation practices and perceived unprofessional conduct in public forums. Multiple users on Reddit have reported being banned from the official 3CX community forums for raising technical concerns or criticizing company policies.< | The company's CTO, Nick Galea, has been the subject of criticism from some 3CX users and partners for alleged heavy-handed moderation practices and perceived unprofessional conduct in public forums. Multiple users on Reddit have reported being banned from the official 3CX community forums for raising technical concerns or criticizing company policies. <ref>{{Cite web |title=My 3CX Partnership Deleted and All Linked Clients Lost |url=https://www.reddit.com/r/3CX/comments/xev0u5/my_3cx_partnership_deleted_and_all_linked_clients/}}</ref><ref>{{Cite web |title=Banned from the 3CX Community |url=https://www.reddit.com/r/3CX/comments/xn0ztp/banned_from_the_3cx_community/}}</ref> | ||
====Supply Chain Incident Response==== | ====Supply Chain Incident Response==== | ||
In March 2023, 3CX was the victim of a high-profile supply chain attack, with | In March 2023, 3CX was the victim of a high-profile supply chain attack, through to be the result of a cascade failure starting with the software X_Trader. This attack was likely caused by North Korean state-sponsored hackers <ref>{{Cite news |last=Greenberg |first=Andy |date=Apr 20, 2023 |title=The Huge 3CX Breach Was Actually 2 Linked Supply Chain Attacks |url=https://www.wired.com/story/3cx-supply-chain-attack-times-two/ |archive-url=https://web.archive.org/web/20250726115243/https://www.wired.com/story/3cx-supply-chain-attack-times-two/ |archive-date=July 26, 2025 |work=Wired |pages=2025-08-12}}</ref> | ||
3CX also faced backlash for requiring users to pay to open support tickets during the breach, which led to further public criticism from system administrators and IT professionals.<ref>{{Cite web |last=CrowdStrike |date=2023-03-29 |title=// 2023-03-29 // SITUATIONAL AWARENESS // CrowdStrike Tracking Active Intrusion Campaign Targeting 3CX Customers // |url=https://www.reddit.com/r/crowdstrike/comments/125r3uu/20230329_situational_awareness_crowdstrike/ |website=reddit}}</ref><blockquote>"I have been in contact with 3CX and their suggestion is to open a support ticket at £75 per incident. Ludicrous." -wars_t (reddit.com) </blockquote> | |||
==References:== | ==References:== | ||
<references /> | |||
Revision as of 03:57, 13 August 2025
🔧 Article status notice: This article heavily relies on AI/LLMs
This article has been marked because its heavy use of LLM generated text may affect its percieved or actual reliability and credibility.
To contact a moderator for removal of this notice once the article's issues have been resolved, please use either the Moderator's noticeboard, or the #appeals
channel on our Discord server (Join using this link]) or use the talk pages on the wiki and leave a message to any of the moderators. List of current moderators.
Learn more ▼
❗Article Status Notice: This Article is a stub
This article is underdeveloped, and needs additional work to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues. Learn more ▼
3CX, Inc., is a software development company and developer of the 3CX Phone System[1].
The 3CX Phone System is a software private branch exchange based on the SIP (Session Initiation Protocol) standard to allow calls via the public switched telephone network (PSTN) or via Voice over Internet Protocol (VoIP) services [1].
In 2023, during a major supply chain attack affecting the 3CX desktop application, company's public response included engaging the services of Google-owned cybersecurity firm Mandiant[2] and advising customers to uninstall affected versions.
Controversies
Customer and Partner Relations
The company's CTO, Nick Galea, has been the subject of criticism from some 3CX users and partners for alleged heavy-handed moderation practices and perceived unprofessional conduct in public forums. Multiple users on Reddit have reported being banned from the official 3CX community forums for raising technical concerns or criticizing company policies. [3][4]
Supply Chain Incident Response
In March 2023, 3CX was the victim of a high-profile supply chain attack, through to be the result of a cascade failure starting with the software X_Trader. This attack was likely caused by North Korean state-sponsored hackers [5]
3CX also faced backlash for requiring users to pay to open support tickets during the breach, which led to further public criticism from system administrators and IT professionals.[6]
"I have been in contact with 3CX and their suggestion is to open a support ticket at £75 per incident. Ludicrous." -wars_t (reddit.com)
References:
- ↑ 1.0 1.1 3CX. "ENTERPRISE GRADE PHONE SYSTEM". 3cx.com. Archived from the original on 2025-08-12. Retrieved 2025-08-12.
{{cite web}}
:|archive-date=
/|archive-url=
timestamp mismatch; 2025-08-13 suggested (help)CS1 maint: numeric names: authors list (link) - ↑ Lakshmanan, Ravie (Mar 31, 2023). "3CX Supply Chain Attack — Here's What We Know So Far". hehackernews.com. Retrieved 2025-08-12.
{{cite web}}
: Check|archive-url=
value (help) - ↑ "My 3CX Partnership Deleted and All Linked Clients Lost".
- ↑ "Banned from the 3CX Community".
- ↑ Greenberg, Andy (Apr 20, 2023). "The Huge 3CX Breach Was Actually 2 Linked Supply Chain Attacks". Wired. pp. 2025-08-12. Archived from the original on July 26, 2025.
- ↑ CrowdStrike (2023-03-29). "// 2023-03-29 // SITUATIONAL AWARENESS // CrowdStrike Tracking Active Intrusion Campaign Targeting 3CX Customers //". reddit.