Jump to content

3CX

From Consumer Rights Wiki
Revision as of 03:57, 13 August 2025 by SpyCrab (talk | contribs) (added sources. reworked stuff (most of the page need some form of restructuring))

🔧 Article status notice: This article heavily relies on AI/LLMs

This article has been marked because its heavy use of LLM generated text may affect its percieved or actual reliability and credibility.


To contact a moderator for removal of this notice once the article's issues have been resolved, you can use the #appeals channel on our Discord server (Join using this link]) or use the talk pages on the wiki and leave a message to any of the moderators. List of current moderators.


Learn more ▼

Article Status Notice: This Article is a stub


This article is underdeveloped, and needs additional work to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues. Learn more ▼

3CX, Inc., is a software development company and developer of the 3CX Phone System[1].

The 3CX Phone System is a software private branch exchange based on the SIP (Session Initiation Protocol) standard to allow calls via the public switched telephone network (PSTN) or via Voice over Internet Protocol (VoIP) services [1].

In 2023, during a major supply chain attack affecting the 3CX desktop application, company's public response included engaging the services of Google-owned cybersecurity firm Mandiant[2] and advising customers to uninstall affected versions.

Controversies

Customer and Partner Relations

The company's CTO, Nick Galea, has been the subject of criticism from some 3CX users and partners for alleged heavy-handed moderation practices and perceived unprofessional conduct in public forums. Multiple users on Reddit have reported being banned from the official 3CX community forums for raising technical concerns or criticizing company policies. [3][4]

Supply Chain Incident Response

In March 2023, 3CX was the victim of a high-profile supply chain attack, through to be the result of a cascade failure starting with the software X_Trader. This attack was likely caused by North Korean state-sponsored hackers [5]

3CX also faced backlash for requiring users to pay to open support tickets during the breach, which led to further public criticism from system administrators and IT professionals.[6]

"I have been in contact with 3CX and their suggestion is to open a support ticket at £75 per incident. Ludicrous." -wars_t (reddit.com)

References:

  1. 1.0 1.1 3CX. "ENTERPRISE GRADE PHONE SYSTEM". 3cx.com. Archived from the original on 2025-08-12. Retrieved 2025-08-12. {{cite web}}: |archive-date= / |archive-url= timestamp mismatch; 2025-08-13 suggested (help)CS1 maint: numeric names: authors list (link)
  2. Lakshmanan, Ravie (Mar 31, 2023). "3CX Supply Chain Attack — Here's What We Know So Far". hehackernews.com. Retrieved 2025-08-12. {{cite web}}: Check |archive-url= value (help)
  3. "My 3CX Partnership Deleted and All Linked Clients Lost".
  4. "Banned from the 3CX Community".
  5. Greenberg, Andy (Apr 20, 2023). "The Huge 3CX Breach Was Actually 2 Linked Supply Chain Attacks". Wired. pp. 2025-08-12. Archived from the original on July 26, 2025.
  6. CrowdStrike (2023-03-29). "// 2023-03-29 // SITUATIONAL AWARENESS // CrowdStrike Tracking Active Intrusion Campaign Targeting 3CX Customers //". reddit.