Thursday, December 14, 2017
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Facebook Will Start Putting Ads Before Videos
Samsung's Smart Speaker Coming Next Year
Internet Neutrality is Officially Dead
Synaptics Brings First In-Display Fingerprint Sensors for Smartphones
Disney to Buy Fox Film and Some TV Businesses for $52 billion
Powerful iMac Pro is Available Today, Starting at $5,000
IBM Announces Collaboration With Leading Companies to Accelerate Quantum Computing
Bing Gets Intelligent Search Features, Powered by AI
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Free CC...
Last 7 Days News : SU MO TU WE TH FR SA All News

Monday, September 18, 2017
Free CCleaner Software Compromised to Open Back-door to Million of PCs


Hackers broke into Piriform's popular CCleaner software last month potentially allowing them to control the devices of more than two million users.

The free program CCleaner is downloaded for personal computers and Android phones as often as five million times a week. It allows users to perform routine maintenance on their systems. It includes functionality such as cleaning of temporary files, analyzing the system to determine ways in which performance can be optimized and provides a more streamlined way to manage installed applications. Piriform, which was bought in July by computer security vendor Avast, says that 130 million people use its software.

Security researchers at Cisco's Talos unit recently observed a case where the download servers used by software vendor to distribute a legitimate software package were leveraged to deliver malware to unsuspecting victims. For a period of time, the legitimate signed version of CCleaner 5.33 being distributed by Avast also contained a multi-stage malware payload that rode on top of the installation of CCleaner. CCleaner boasted over 2 billion total downloads by November of 2016 with a growth rate of 5 million additional users per week. Given the potential damage that could be caused by a network of infected computers even a tiny fraction of this size the security firm decided to move quickly. On September 13, 2017 Cisco Talos notified Avast of its findings so that they could initiate appropriate response activities.

The researchers identified a version of CCleaner downloaded in August, which included remote administration tools that tried to connect to several unregistered web pages, presumably to download additional unauthorized programs

The sophisticated attack penetrated an established and trusted supplier in a manner similar to June's "NotPetya" attack on companies that downloaded infected Ukrainian accounting software.

The optimization software had a proper digital certificate, which means that other computers automatically trust the program, the researchers said.

Piriform confirmed that two programs released in August were compromised. It advised users of CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 to download new versions. The company said that 2.27 million users had downloaded the August version of CCleaner while only 5,000 users had installed the compromised version of CCleaner Cloud.

A new version of CCleaner was released the same day and a clean version of CCleaner Cloud was released on Sept. 15, it said.

Piriform said it had worked with U.S. law enforcement to shut down a server located in the United States to which traffic was set to be directed.

This is a prime example of the extent that attackers are willing to go through in their attempt to distribute malware to organizations and individuals around the world. By exploiting the trust relationship between software vendors and the users of their software, attackers can benefit from users' inherent trust in the files and web servers used to distribute updates. In many organizations data received from commonly software vendors rarely receives the same level of scrutiny as that which is applied to what is perceived as untrusted sources. Attackers have shown that they are willing to leverage this trust to distribute malware while remaining undetected.



Previous
Next
Nokia Receives Decision in Patent License Arbitration with LG Electronics        All News        Samsung to Produce Its Own 1,000fps, 3-layer Image Sensor for Smartphones
Waymo's Self-Driving Car to have Intel Chips Inside     General Computing News      Digital Advertisers Deeply Concerned Over Anti-tracking Functionality of Apple's Safari 11 Browser

Get RSS feed Easy Print E-Mail this Message

Related News
Hackers Hit ATM Networks In U.S. and Russian Bank Breaches
Millions Time Warner Cable Records Exposed, Instagram Security Bug Fixed
HBO Offered $250,000 to Hackers
Hackers Attacked U.K. Parliament
WikiLeaks Says 'Athena' CIA Spying Program Targets All Versions of Windows
Hackers Demonstrate VM Escapes In Pwn2Own 2017 Hacking Contest
U.S.Navy Disclosed Security Breach In Its Systems
Hackers Probed Voting Systems, U.S. Says
Hackers Accesssed Customer Credit Card Data From Acer Store
Mark Zuckerberg's Social Media Accounts Were Hacked
Hackers Steal, Sell Verizon Enterprise Customer Data
U.S IRS Discovers More Data Had Leaked In Last Year's Cyberattack

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2017 - All rights reserved -
Privacy policy - Contact Us .