Daily Management Review

Hackers used infected versions of Piriform’s CC Cleaner to gain corporate secrets


09/22/2017


Users of CC Cleaner are advised to re-download the clean version of the app from Piriform’s website.



According to the research conducted by Cisco Systems that was released on Wednesday, the hackers who penetrated Piriform in August, had also tried to infect systems at Intel, Microsoft and other top tech companies.

This suggest that the hack was far more dangerous than was previously estimated.

Having breached Piriform’s systems, hackers were able to infect the company’s widely used utility, Ccleaner, said Prague-based Avast Software.

In a blog post this week, Piriform and its parent Avast had said no damage had been detected so far, although more than 2 million people had installed infected versions of its utility – Ccleaner.

Even though the infected versions allowed the hackers remote communications, Avast said no alarm was warranted since it had cooperated with researchers and law enforcement agencies and had taken control of the command sites, early in the attack.

Despite, researches at Cisco said, as per a control server that was seized by U.S. law enforcement, hackers had installed additional malicious software on at least 20 other computers.

It is yet unclear these computers are housed in which company. The list of networks that hackers had gone after include Cisco, Sony, Samsung and Akamai.

“It’s like the bad guys cast a net and caught all the fish, but only wanted to infect the machines that were most interesting,” said researcher Craig Williams of Cisco’s Talos unit.

As per Williams, the hackers could have used CC CCleaner installations to steal technology secrets from companies.

The more troubling news is that the hackers may have been looking to plant malware into those companies’ products, which are typically used by high-value targets in government and business around the world.

As per Ondrej Vlcek, Avast’s Chief Technology Officer, “a very small minority of the endpoints” had received subsequent infections. Avast has been contacting the affected firms quietly.

“We don’t believe in going public with any of this stuff while investigation is still ongoing,” he said. “We know that this is also the preference of the law enforcement personnel.” 

Computer security companies, including Cisco, Kaspersky Lab, and others have said the hacking attack had reused code that was previously seen in hacks connected to Chinese authorities.

Since the code could have been stolen, researchers are yet to identify the country from which the hackers originated.



Source:

https://www.reuters.com

:

https://www.reuters.com


 








Science & Technology

UK trials new breathing aid developed by Mercedes Formula One

Uber sues Los Angeles authorities over user data collection

Google Introduces New Coronavirus Website

WHO Warns That The Youth Are ‘Not Invincible' To The Novel Coronavirus

Chinese software company learns to recognize 95% of masked faces

World's largest retailer to use 5G for medical services

SpaceX Receives Approval To Create Research & Manufacturing Facility In Los Angeles

JPMorgan: Transition to e-money will be based on blockchain

Tesla In Advance Talks With CATL For Using Lithium Batteries

Financial giants and US government turn to quantum computers

World Politics

World & Politics

Tesla Supplies Free Ventilators For Immediate Patients And Not For Storing

India Turns Train Coaches Into Isolation Wards For COVID-19 Patients

Aerospace Consortium To Build Ten Thousand Ventilator In Britain

US Ambassador To UK Holds China Responsible For Global Spread Of Coronavirus

China to lift quarantine in Wuhan on April 8

British Government Hires Former Nestle’s Executive For ‘War Room’ Food Security

Canada, Australia refuse to send athletes to Olympics 2020

Plans For A Possible Delay Of Olympics Being Formulated By Tokyo Organizers: Reuters