The official installer for the Comm100 Live Chat Option that businesses use for customer communication has been trojanized as part of a new supply-chain attack. Researchers at CrowdStrike reported that the infected variant became available on September 26 and was active until September 29. The trojanized installer used a valid digital signature which would have stopped most anti-virus solutions from being able to identify it as malicious. The attacker implanted a JavaScript backdoor in the software which runs when downloaded. This backdoor then fetches a second stage obfuscated script from a hard coded URL, which gives the attackers remote shell access to the infected endpoints via command line. Researchers have attributed this attack to a Chinese speaking threat group, and more specifically a cluster that has been reportedly targeting the Asian gambling community.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security