Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

CCleaner Malware that Endangers Enterprise Networks

 

During 2017, hackers thrust malware into certain edition of CCleaner a computer maintenance application. Presumably, they were since getting ready for serving 3rd-stage malware onto a minimum chosen number of PCs from the total 2.27m which had loaded the infected utility software from the Web.

 

Avast Software that had obtained CCleaner besides Piriform, its original creator, during July 2017, admitted the above discovery was done past week, through its blog as well as at the Cancun, Mexico held SAS Conference. One kind of cyber-attack background, ShadowPad is popular with criminals who load it onto networks for acquiring control over systems from the remote along with the ability to log keystrokes and exfiltrate data.

 

Security researchers, says Avast, discovered that 4 Piriform PCs contained infection from ShadowPad the tool for cyber-criminals that enables them gain remote control along with password-stealing and keylogging modular functionalities.

 

With probe ongoing into certain backdoor, which was loaded onto CCleaner last year, the security software company stated it discovered threat actors responsible for the assault as considering planting ShadowPad malware for the third time onto hijacked PCs. Threatpost.com posted this, March 12, 2018.

 

The ShadowPad malicious program proliferated onto the build server of Piriform over the period March to 4th July, 2017. Avast when cleaning the malware off Piriform network began combining the Piriform PCs and infrastructure followed with inspecting the same only to find that they had the initial editions of stage 1 and stage 2 binaries. Subsequently, 4 PCs from Piriform network under study showed signs of one special modular malware with multiple purposes known as ShadowPad getting planted.

 

It's said ShadowPad is the creation of Axiom a hacker group of China. Costin Raiu researcher at Kaspersky Lab had already spotted ShadowPad's code within the foremost 1st-stage of CCleaner malware.

 

Apparently, ShadowPad hasn't ever been detected on any PC other than the 4 Piriform systems, indicating when the first assault was corrected it possibly spoilt the attackers' attempts prior to them being executed. While investigation into the PCs' data dumps goes on, the company is set to post up-to-date information immediately as more details come up.

» SPAMfighter News - 16-03-2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next