Chinese hackers exploit Canadian customer service firm

The full extent of the impact is not yet known

Chinese hackers exploit Canadian customer service firm


By Lyle Adriano

Hackers suspected to originate from China have tampered with software being widely distributed by the Canadian customer service company Comm100, security researchers have found.

In a blog post, US-based cybersecurity firm CrowdStrike reported detecting malware being distributed by Comm100, which offers customer service products such as chatbots and social media management tools.

CrowdStrike found that a live chat app installer on Comm100’s website helped deliver trojan malware. Anyone who downloaded the app from September 27, 2022, through to the morning of September 29, 2022, is potentially affected by the malware, CrowdStrike reported, adding that the malware was detected at organizations from various industries – including industrial, healthcare, technology, manufacturing, insurance and telecommunications, in both North America and in Europe.

The trojan app installer contains a backdoor, which gathers host information and provides the hacker with remote shell functionality, it was found. It was also noted by security researchers that the trojan installer was signed on using a valid Comm100 certificate.

CrowdStrike stated that it is “moderately” confident that the threat actors responsible for the Comm100 supply chain attack have a China nexus, based on the Chinese-language comment in the malware. It was also suspected that the threat actors are the same hackers who previously launched cyberattacks against online gambling businesses in East and Southeast Asia.

Comm100 said in a message last week that it had fixed its software, and that more details on the breach would be released soon. The scope of the malware exploit is unclear, but Reuters reported that Comm100 had over 15,000 customers in some 80 countries, citing information on the company’s website.

Related Stories

Keep up with the latest news and events

Join our mailing list, it’s free!