![]() For now, any concerned users should head to the Piriform website to download the latest software. Yung said the company wouldn't speculate on how the attack happened or possible perpetrators. It's unclear just who was behind the attacks. ![]() That led to the conclusion that the attackers hadn't launched the second phase of their attack to cause more harm to victims. He told Forbes the company used its Avast security tool to scan machines on which the affected CCleaner app was installed (in 30 per cent of Avast installs, CCleaner was also resident on the PC). but it could be useful in follow-up targeted attacks against specific users."Īvast chief technology officer Ondrej Vlcek said there was, however, little reason to panic. Of course, it may be that they really only stole. Applications include common, popular software such as 7-Zip, WinRAR, Recuva, TeamViewer, CCleaner and even McAfee Security Scan Plus. Of the Piriform claim it had no evidence of much wrongdoing by the hacker, Grooten added: "As I read the Cisco blog, there was a backdoor that could have been used for other purposes. "I have a feeling they are downplaying it indeed," said Martijn Grooten, editor of security publication Virus Bulletin. Not all are convinced by the claims of Piriform, acquired by Avast in July. In other words, to the best of our knowledge, we were able to disarm the threat before it was able to do any harm." "Users of CCleaner Cloud version have received an automatic update. "The threat has now been resolved in the sense that the rogue server is down, other potential servers are out of the control of the attacker. The CCleaner app, designed to help users carry out good cyber hygiene, was itself infected. For weeks then, the malware was spreading inside supposedly-legitimate security software. Talos warned in a blog Monday that the affected version was released on August 15, but on September 12 an untainted version 5.34 was released. The affected app, CCleaner, gets 5 million downloads a week, making the threat particularly severe, researchers at Cisco Talos warned.įurther investigation found the CCleaner download server was hosting the backdoored app as far back as September 11. According to Avast's own figures, 2.27 million ran the affected software, though the company said users should not panic. The tainted application allows for download of further malware, be it ransomware or keyloggers, with fears millions are affected. Users of Avast-owned security application CCleaner for Windows have been advised to update their software immediately, after researchers discovered criminal hackers had installed a backdoor in the tool. This trust relationship is then abused to attack organizations and individuals and may be performed for a number of different reasons." This is because with supply chain attacks, the attackers are relying on the trust relationship between a manufacturer or supplier and a customer. They said: "Supply chain attacks are a very effective way to distribute malicious software into target organizations. Cisco's TALOS security researchers discovered a devious way to infect millions of machines.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |