It isn't always defaults: Scans for 3CX usernames, (Mon, Nov 10th)
Today, I noticed scans using the username "FTP_3cx" showing up in our logs. 3CX is a well-known maker of business phone system software [1]. My first guess was that this was a default user for one of their systems. But Google came up empty for this particular string. The 3CX software does not appear to run an FTP server, but it offers a feature to back up configurations to an FTP server [2]. The example user used in the documentation is "3cxftpuser", not "FTP_3cx". Additionally, the documentation notes that the FTP server can run on a different system from the 3CX software. For a backup, it would not make much sense to have it all run on the same system.
AI Analysis
Technical Summary
This threat involves scanning activity detected in network logs where attackers attempt to authenticate to FTP servers using usernames related to 3CX, a popular business phone system software vendor. The specific username "FTP_3cx" is not a documented default user, and 3CX itself does not run an FTP server but supports backing up its configuration files to an external FTP server. The scans likely target these external FTP servers configured by administrators to store 3CX backups. Attackers use a range of usernames such as "3cx", "3CXBackup", "backup3cx", and "FTP_3cx" combined with weak or guessable passwords like "3CXBackup" and "telecom" to gain unauthorized FTP access. Since FTP credentials often overlap with system user credentials, successful FTP compromise could allow attackers to access telnet or SSH services, escalating their foothold on the system. The backup data stored on these FTP servers may contain sensitive configuration details that could facilitate further compromise of the 3CX system or the broader network. The threat does not exploit a vulnerability in 3CX software itself but exploits poor security practices around backup storage and credential management. No public exploits or CVEs are associated with this activity, and the threat is currently observed as scanning and credential guessing attempts without confirmed breaches. The use of FTP, an unencrypted protocol, further exacerbates the risk by exposing credentials and data in transit. This threat underscores the importance of securing backup mechanisms, using strong, unique credentials, and avoiding legacy protocols like FTP for sensitive data transfers.
Potential Impact
For European organizations using 3CX phone systems, this threat could lead to unauthorized access to backup FTP servers if weak or default credentials are used. Compromise of these backups may expose sensitive configuration data, enabling attackers to disrupt telephony services, intercept communications, or pivot to other internal systems. Given that FTP credentials may overlap with system login credentials, attackers could gain broader network access via telnet or SSH, increasing the risk of data breaches or service outages. The impact is particularly significant for organizations relying heavily on 3CX for business communications, such as call centers, enterprises, and public sector bodies. Additionally, the use of unencrypted FTP increases the risk of credential interception on the network. While no active exploitation is reported, the scanning activity indicates reconnaissance that could precede targeted attacks. This threat could disrupt business continuity, compromise confidentiality of communications, and damage organizational reputation. European entities with lax backup security or legacy FTP setups are at higher risk.
Mitigation Recommendations
European organizations should immediately audit their 3CX backup configurations to identify any FTP servers used for storing backups. Replace FTP with secure alternatives such as SFTP or FTPS to encrypt data in transit and prevent credential interception. Enforce strong, unique passwords for all backup-related user accounts and disable any default or unused accounts. Implement multi-factor authentication where possible for access to backup servers. Restrict FTP server access via network segmentation and firewall rules to only trusted hosts. Regularly monitor logs for unusual authentication attempts or scanning activity targeting 3CX-related usernames. Consider encrypting backup files themselves to protect sensitive configuration data even if the storage server is compromised. Educate administrators on the risks of using legacy protocols and the importance of secure backup practices. Conduct periodic penetration testing and vulnerability assessments focused on backup infrastructure. Finally, keep 3CX software and related systems updated and follow vendor security guidance to minimize exposure.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Belgium, Sweden
It isn't always defaults: Scans for 3CX usernames, (Mon, Nov 10th)
Description
Today, I noticed scans using the username "FTP_3cx" showing up in our logs. 3CX is a well-known maker of business phone system software [1]. My first guess was that this was a default user for one of their systems. But Google came up empty for this particular string. The 3CX software does not appear to run an FTP server, but it offers a feature to back up configurations to an FTP server [2]. The example user used in the documentation is "3cxftpuser", not "FTP_3cx". Additionally, the documentation notes that the FTP server can run on a different system from the 3CX software. For a backup, it would not make much sense to have it all run on the same system.
AI-Powered Analysis
Technical Analysis
This threat involves scanning activity detected in network logs where attackers attempt to authenticate to FTP servers using usernames related to 3CX, a popular business phone system software vendor. The specific username "FTP_3cx" is not a documented default user, and 3CX itself does not run an FTP server but supports backing up its configuration files to an external FTP server. The scans likely target these external FTP servers configured by administrators to store 3CX backups. Attackers use a range of usernames such as "3cx", "3CXBackup", "backup3cx", and "FTP_3cx" combined with weak or guessable passwords like "3CXBackup" and "telecom" to gain unauthorized FTP access. Since FTP credentials often overlap with system user credentials, successful FTP compromise could allow attackers to access telnet or SSH services, escalating their foothold on the system. The backup data stored on these FTP servers may contain sensitive configuration details that could facilitate further compromise of the 3CX system or the broader network. The threat does not exploit a vulnerability in 3CX software itself but exploits poor security practices around backup storage and credential management. No public exploits or CVEs are associated with this activity, and the threat is currently observed as scanning and credential guessing attempts without confirmed breaches. The use of FTP, an unencrypted protocol, further exacerbates the risk by exposing credentials and data in transit. This threat underscores the importance of securing backup mechanisms, using strong, unique credentials, and avoiding legacy protocols like FTP for sensitive data transfers.
Potential Impact
For European organizations using 3CX phone systems, this threat could lead to unauthorized access to backup FTP servers if weak or default credentials are used. Compromise of these backups may expose sensitive configuration data, enabling attackers to disrupt telephony services, intercept communications, or pivot to other internal systems. Given that FTP credentials may overlap with system login credentials, attackers could gain broader network access via telnet or SSH, increasing the risk of data breaches or service outages. The impact is particularly significant for organizations relying heavily on 3CX for business communications, such as call centers, enterprises, and public sector bodies. Additionally, the use of unencrypted FTP increases the risk of credential interception on the network. While no active exploitation is reported, the scanning activity indicates reconnaissance that could precede targeted attacks. This threat could disrupt business continuity, compromise confidentiality of communications, and damage organizational reputation. European entities with lax backup security or legacy FTP setups are at higher risk.
Mitigation Recommendations
European organizations should immediately audit their 3CX backup configurations to identify any FTP servers used for storing backups. Replace FTP with secure alternatives such as SFTP or FTPS to encrypt data in transit and prevent credential interception. Enforce strong, unique passwords for all backup-related user accounts and disable any default or unused accounts. Implement multi-factor authentication where possible for access to backup servers. Restrict FTP server access via network segmentation and firewall rules to only trusted hosts. Regularly monitor logs for unusual authentication attempts or scanning activity targeting 3CX-related usernames. Consider encrypting backup files themselves to protect sensitive configuration data even if the storage server is compromised. Educate administrators on the risks of using legacy protocols and the importance of secure backup practices. Conduct periodic penetration testing and vulnerability assessments focused on backup infrastructure. Finally, keep 3CX software and related systems updated and follow vendor security guidance to minimize exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://isc.sans.edu/diary/rss/32464","fetched":true,"fetchedAt":"2025-11-10T15:27:48.358Z","wordCount":490}
Threat ID: 69120474b8ffd8a38b9d8f95
Added to database: 11/10/2025, 3:27:48 PM
Last enriched: 11/10/2025, 3:28:10 PM
Last updated: 12/26/2025, 1:45:38 AM
Views: 120
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15093: Cross Site Scripting in sunkaifei FlyCMS
MediumCVE-2025-14913: CWE-862 Missing Authorization in wpshuffle Frontend Post Submission Manager Lite – Frontend Posting WordPress Plugin
MediumCVE-2025-15088: SQL Injection in ketr JEPaaS
MediumCVE-2025-15087: Improper Authorization in youlaitech youlai-mall
MediumCVE-2025-15086: Improper Access Controls in youlaitech youlai-mall
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.