Tuesday, October 16, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
New Cyber-shot HX99 Is Possibly the World's Smallest Travel High Zoom Camera
New Palm Phone Is About the Size of a Credit Card
HP Arms ZBooks with Intel Core i9 Processors
Dell Expands UltraSharp Monitor Family With New UltraSharp 49-inch Dual QHD Monitor
ARM and Intel to Secure Internet of Things
Adobe Announces New Creative Cloud at MAX 2018
8K TV Shipments to Reach More Than 400,000 Units in 2019, IHS Markit Says
Sharp Releases New AQUOS 8K LCD TVs With 8K Satellite Tuner
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Free CC...
Last 7 Days News : SU MO TU WE TH FR SA All News

Monday, September 18, 2017
Free CCleaner Software Compromised to Open Back-door to Million of PCs


Hackers broke into Piriform's popular CCleaner software last month potentially allowing them to control the devices of more than two million users.

The free program CCleaner is downloaded for personal computers and Android phones as often as five million times a week. It allows users to perform routine maintenance on their systems. It includes functionality such as cleaning of temporary files, analyzing the system to determine ways in which performance can be optimized and provides a more streamlined way to manage installed applications. Piriform, which was bought in July by computer security vendor Avast, says that 130 million people use its software.

Security researchers at Cisco's Talos unit recently observed a case where the download servers used by software vendor to distribute a legitimate software package were leveraged to deliver malware to unsuspecting victims. For a period of time, the legitimate signed version of CCleaner 5.33 being distributed by Avast also contained a multi-stage malware payload that rode on top of the installation of CCleaner. CCleaner boasted over 2 billion total downloads by November of 2016 with a growth rate of 5 million additional users per week. Given the potential damage that could be caused by a network of infected computers even a tiny fraction of this size the security firm decided to move quickly. On September 13, 2017 Cisco Talos notified Avast of its findings so that they could initiate appropriate response activities.

The researchers identified a version of CCleaner downloaded in August, which included remote administration tools that tried to connect to several unregistered web pages, presumably to download additional unauthorized programs

The sophisticated attack penetrated an established and trusted supplier in a manner similar to June's "NotPetya" attack on companies that downloaded infected Ukrainian accounting software.

The optimization software had a proper digital certificate, which means that other computers automatically trust the program, the researchers said.

Piriform confirmed that two programs released in August were compromised. It advised users of CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 to download new versions. The company said that 2.27 million users had downloaded the August version of CCleaner while only 5,000 users had installed the compromised version of CCleaner Cloud.

A new version of CCleaner was released the same day and a clean version of CCleaner Cloud was released on Sept. 15, it said.

Piriform said it had worked with U.S. law enforcement to shut down a server located in the United States to which traffic was set to be directed.

This is a prime example of the extent that attackers are willing to go through in their attempt to distribute malware to organizations and individuals around the world. By exploiting the trust relationship between software vendors and the users of their software, attackers can benefit from users' inherent trust in the files and web servers used to distribute updates. In many organizations data received from commonly software vendors rarely receives the same level of scrutiny as that which is applied to what is perceived as untrusted sources. Attackers have shown that they are willing to leverage this trust to distribute malware while remaining undetected.


Previous
Next
Nokia Receives Decision in Patent License Arbitration with LG Electronics        All News        Samsung to Produce Its Own 1,000fps, 3-layer Image Sensor for Smartphones
Waymo's Self-Driving Car to have Intel Chips Inside     General Computing News      Digital Advertisers Deeply Concerned Over Anti-tracking Functionality of Apple's Safari 11 Browser

Get RSS feed Easy Print E-Mail this Message

Related News
Hackers Stole Phone Number and Email Details of 29 Million Facebook Users
Super Micro Servers Manipulated: report
Apple, Amazon Deny Report on Chinese Hardware Attack
Facebook Says Hackers Did not access Other Sites
Japanese Cryptocurrency Exchange Zaif Hacked
U.S. Points at North Korean hacker in Sony, WannaCry Cyberattacks
British Airways Website Hack Exposed Customer Data
U.S., UK Accuse Russia Of Backing Global Cyber Espionage Campaign
Hackers Attacked PyeongChang 2018 Winter Olympic Games
North Korea Behind attacks on Cryptocurrency Exchanges: report
Hackers Hit ATM Networks In U.S. and Russian Bank Breaches
Millions Time Warner Cable Records Exposed, Instagram Security Bug Fixed

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .