• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
comm100 chat provider hijacked to spread malware in supply chain

Comm100 Chat Provider Hijacked to Spread Malware in Supply Chain Attack

You are here: Home / General Cyber Security News / Comm100 Chat Provider Hijacked to Spread Malware in Supply Chain Attack
October 3, 2022

A menace actor possible with associations to China has been attributed to a new source chain attack that consists of the use of a trojanized installer for the Comm100 Stay Chat software to distribute a JavaScript backdoor.

Cybersecurity firm CrowdStrike explained the attack produced use of a signed Comm100 desktop agent application for Windows that was downloadable from the company’s site.

The scale of the attack is at this time unknown, but the trojanized file is explained to have been discovered at companies in the industrial, health care, technology, production, insurance coverage, and telecom sectors in North America and Europe.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Comm100 is a Canadian provider of dwell audio/video clip chat and purchaser engagement computer software for enterprises. It promises to have much more than 15,000 buyers throughout 51 nations.

CyberSecurity

“The installer was signed on September 26, 2022 at 14:54:00 UTC making use of a valid Comm100 Network Company certificate,” the corporation observed, including it remained readily available until finally September 29.

Embedded within the weaponized executable is a JavaScript-centered implant that executes a second-stage JavaScript code hosted on a distant server, which is built to supply the actor with surreptitious distant shell operation.

Also deployed as aspect of the article-exploitation activity is a destructive loader DLL named MidlrtMd.dll that launches an in-memory shellcode to inject an embedded payload into a new Notepad procedure.

Comm100 Chat

Supply chain compromises, like that of SolarWinds and Kaseya, are turning out to be an more and more worthwhile tactic for threat actors to target a extensively-utilized program supplier to acquire a foothold in the networks of downstream consumers.

As of crafting, none of the security sellers flag the installer as malicious. Following responsible disclosure, the issue has considering the fact that been tackled with the release of an current installer (10..9).

CyberSecurity

CrowdStrike has tied the attack with average self esteem to an actor with a China nexus centered on the presence of Chinese-language feedback in the malware and the concentrating on of on the web gambling entities in East and Southeast Asia, an already recognized spot of interest for China-primarily based intrusion actors.

That explained, the payload sent in this action differs from other malware households previously discovered as operated by the group, suggesting an enlargement to its offensive arsenal.

The identify of the adversary was not disclosed by CrowdStrike, but the TTPs stage in the way of a menace actor named Earth Berberoka (aka GamblingPuppet), which earlier this yr was uncovered employing a phony chat application termed MiMi in its attacks towards the gambling marketplace.

Found this report intriguing? Adhere to THN on Fb, Twitter  and LinkedIn to examine extra distinctive material we write-up.


Some components of this post are sourced from:
thehackernews.com

Previous Post: «researchers link cheerscrypt linux based ransomware to chinese hackers Researchers Link Cheerscrypt Linux-Based Ransomware to Chinese Hackers
Next Post: Lazarus Group Exploits Dell Driver Vulnerability to Bypass Windows Security Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.