Suspected Chinese hackers tampered with widely used customer chat program: Researchers : The Tribune India

Join Whatsapp Channel

Suspected Chinese hackers tampered with widely used customer chat program: Researchers

The scope and scale of the hack not immediately clear

Suspected Chinese hackers tampered with widely used customer chat program: Researchers

Photo for representational purpose only. Reuters file



Washington, October 1

Suspected Chinese hackers tampered with widely used software distributed by a small Canadian customer service company, another example of a "supply chain compromise" made infamous by the hack on US networking company SolarWinds.

US cybersecurity firm CrowdStrike said in a blog post it had discovered malicious software being distributed by Vancouver-based Comm100, which provides customer service products, such as chat bots and social media management tools, to a range of clients around the globe.

The scope and scale of the hack was not immediately clear.

In a message, Comm100 said it had fixed its software earlier Thursday and that more details would soon be forthcoming. The company did not immediately respond to follow-up requests for information.

CrowdStrike researchers believe the malicious software was in circulation for a couple of days but would not say how many companies had been affected, divulging only that "entities across a range of industries" were hit. A person familiar with the matter cited a dozen known victims, although the actual figure could be much higher.

Comm100 on its website said it had more than 15,000 customers in some 80 countries.

CrowdStrike executive Adam Meyers said in a telephone interview that the hackers were suspected to be Chinese, citing their patterns of behaviour, language in the code, and the fact that one victim had repeatedly been targeted by Chinese hackers in the past.

The Chinese government rejected the claim. In an email, Chinese Embassy spokesperson Liu Pengyu said officials in Beijing "firmly oppose and crack down on all forms of cyber hacking in accordance with the law" and that the United States "has been loudly active in fabricating and spreading lies about so-called 'Chinese hackers.'"

Supply chain compromises – which work by tampering with widely used enterprise software to hack its clients downstream – have been of increasing concern since alleged Russian hackers broke into Texas IT management firm SolarWinds Corp and used it as a springboard to hack U.S. government agencies and a host of private firms.

Meyers, whose firm was among those that responded to the SolarWinds hack, said the Comm100 find was a reminder that other nations used the same techniques.

"China is engaging in supply chain attacks," he said. Reuters


Top News

Salman Khan house firing case: Accused attempts suicide in lock-up, dies at hospital in Mumbai

Salman Khan house firing case: Accused attempts suicide in lock-up, dies at hospital in Mumbai

Deceased was accused of supplying weapons to shooters who op...

2 Delhi schools evacuated after they receive bomb threat

At least 100 schools receive bomb threats in Delhi NCR; found nothing after checks, say police

The schools are evacuated after local police are informed ab...

Plea in Supreme seeking expert panel to examine possible side effects, risk factors of Covishield vaccine

PIL in Supreme Court seeks directions to study possible side effects of Astrazeneca's Covishield vaccine

Astrazeneca has admitted before a court in UK that Covishiel...

Sidhu Moosewala murder case: Court frames charges against Lawrence Bishnoi, 26 others

Sidhu Moosewala murder case: Court frames charges against jailed gangster Lawrence Bishnoi, 26 others

Canada-based gangster Goldy Brar, prime accused in the case,...


Cities

View All