Avast says that There’s malware in that CCleaner software update

in steem •  7 years ago 

image3.png

We're all used or at least have heard about the CCCleaner software , but how about this...

A software package update for a Windows utility product distributed by antivirus vendor Avast has been spreading an unsavory surprise: a malware package that could allow affected computers to be remotely accessed or controlled with what appears to be a legitimate signing certificate. The malware, which was distributed through the update server for the Windows cleanup utility CCleaner, was apparently inserted by an attacker who compromised the software "supply chain" of Piriform, which was acquired by Avast in July. There have been more than 2 billion downloads of CCleaner worldwide, so the potential impact of the malware is huge.

Software updates are increasingly being targeted by distributors of malware, because they provide a virtually unchecked path to infect millions—or even billions—of computers. A compromised software update server for Ukraine software vendor M.E.Doc was used to distribute the NotPetya ransomware attack in July. "Watering hole" attacks, such as the ones used against Facebook, Apple, and Twitter four years ago, are often used to compromise the computers used by software developers. When successful, they can give malware authors what amounts to the keys to the software developer's kingdom—their compilation tools and signing certificates, as well as access to their workflow for software updates.

In a blog post this morning, Cisco Talos Intelligence's Edmund Brumaghin, Ross Gibb, Warren Mercer, Matthew Molyett, and Craig Williams reported that Talos had detected the malware during beta testing of a new exploit-detection technology. The malware was part of the signed installer for CCleaner v5.3 and included code that called back to a command-and-control server as well as a domain-generation algorithm intended to find a new C&C server if the hard-coded IP address of the primary server was lost. Copies of the malicious software installer were distributed to CCleaner users between August 15 and September 12, 2017, using a valid certificate issued to Piriform Ltd by Symantec.

Talos registered all of the domains associated with the algorithm, which had not been previously configured, to "black hole" the malware and prevent it from reestablishing communications in the future. The hard-coded IP address pointed to a server at the virtual dedicated hosting service ServerCrate, which was taken down after the malware was reported to Avast.

The malware checked to see if it was running with administrative privileges and shut down if it was not. It also went into a timed "sleep" mode if it did not get a response from a secure HTTP request to the primary C&C server. In cases where the samples found by Talos did successfully communicate with the C&C server, they would generate a system profile of the computer they had infected and post it back to the server. They would then retrieve shellcode from the server to execute locally and then clear the code from memory. It's not apparent what type of remote code may have been executed on infected systems.

A bug in the malware code prevented the software from using the IP address created by the domain-generation algorithm—the code never accessed the address it created and may have simply been an incomplete feature intended to be updated later. The malware code for the algorithm would look for the DNS records of the domains generated by the algorithm based on the date for two IP addresses and then perform a calculation using the values of the two addresses to find another IP address. This would have made discovery of the actual second C&C server through DNS request monitoring difficult at best.

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

Not indicating that the content you copy/paste is not your original work could be seen as plagiarism.

Some tips to share content and add value:

  • Use a few sentences from your source in “quotes.” Use HTML tags or Markdown.
  • Linking to your source
  • Include your own original thoughts and ideas on what you have shared.

Repeated plagiarized posts are considered spam. Spam is discouraged by the community, and may result in action from the cheetah bot.

Creative Commons: If you are posting content under a Creative Commons license, please attribute and link according to the specific license. If you are posting content under CC0 or Public Domain please consider noting that at the end of your post.

If you are actually the original author, please do reply to let us know!

Thank You!

Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:
https://www.pcabusers.org/phpbb3/viewtopic.php?t=61317

Congratulations @xoni! You have completed some achievement on Steemit and have been rewarded with new badge(s) :

Award for the number of upvotes received
Award for the number of posts published

Click on any badge to view your own Board of Honor on SteemitBoard.
For more information about SteemitBoard, click here

If you no longer want to receive notifications, reply to this comment with the word STOP

By upvoting this notification, you can help all Steemit users. Learn how here!

@steemcleaners and @cheetah and others accused me of spamming here because I wrote one word. I wrote good. I wrote good because the update was good. Are you saying that I did not think it was good? Do you watch my videos on YouTube? I talk about these things. I believe in blockchain and crypto. Are you denying that? I have been using Ubuntu for over a decade. I am buying crypto. I am learning and educating people everyday. I am Joey Arnold and I sometimes do not have the time to write very long comments but I what I do write I mean. When you say that I am spam you are therefore attacking the freedoms of speech and expressions. You make people fear being censored. We left Facebook to escape censorship but we are being bullied too much by whales and others in Steemit. Be careful. 2017-09-25 Monday 1:38 PM MDNH JOEYARNOLDVN: Original Oatmeal L4OJ OJAWALL Oregon 1985 Joey Arnold:
http://85usa.blogspot.com

World news at the Drudge Report:
http://DrudgeReport.com

thanks to @steemcleaners and @cheetah , i was new here on steemit and i didn't get how steemit really worked :) as a begginer :) so thank you for your attention.

  ·  7 years ago (edited)Reveal Comment

Spamming comments is frowned upon by the community.

Continued comment spamming may result in action from the cheetah bot.

@steemcleaners, false accusations are frown upon. Please be careful.

@cheetah, I was falsely accused of something because of my one word comment. But one word comments are not spam. You think it is spam. You are attacking free speech. Tear down the statues? Are you working for BLM and ANTIFA and Soros and KKK and ISIS and others?