It is critical to remove version 5.33 of CCleaner software, since the malware can hide on a system for up to a year, noted Talos. Users should wipe their entire computers - removing and reinstalling everything - and restore files and data from a pre-Augbackup. Today, we are going to disclose new facts about the incident that we received since the last public update. That is, despite the fact that CCleaner is a consumer product, the purpose of the attack was not to attack consumers and their data instead, the CCleaner customers were used to gain access to corporate networks of select large enterprises. As published in our previous blog posts, analysis of the CnC server showed that the incident was in fact an Advanced Persistent Threat (APT) attack, targeting specific high-tech and telecommunications companies. We would like to update our customers and the general public on the latest findings regarding the investigation of the recent CCleaner security incident. Once the malware was installed, attackers were able to gain access to a user’s computer and other connected systems to steal sensitive personal data and/or credentials for online banking and other online activities.Įarlier this week (September 25), Avast issued the following information in a blog… However, many consumers remain at risk - and will remain at risk even after updating the latest CCleaner software. Some systems already protected by other anti-malware software such as VIPRE are likely to be unaffected. Avast corrected the problem, removed the old software and created a new version of CCleaner. On September 13, 2017, Cisco Talos notified Avast that it could begin corrective action. The CCleaner attack was discovered by Cisco Talos, Cisco’s cybersecurity team. This impressive figure, the release noted, equates to more than one download for every three people on earth and that CCleaner downloads now top 20 million per month. In a press release last November, Piriform stated that CCleaner, had reached 2 billion downloads and counting, making it one of the most popular pieces of software worldwide. Ironically, Piriform is owned by Avast, a leading provider of anti-malware software. This type of attack typically succeeds because the bad guys exploit the trust relationship between a manufacturer or supplier and a customer. Inspired eLearning: Deepfakes (Video)Īttackers hid malware inside CCleaner between August 15 and Septemwhen version 5.33 of the app was available for download.ĬCleaner, a computer cleaning and optimization tool developed by Piriform, was hit by criminals in a supply chain attack, by which hackers can infect downloads to trusted software.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |