CCleaner Malware Infects Big Tech Companies With Second Backdoor

The gathering of obscure programmers who captured CCleaner’s download server to convey a noxious adaptation of the prominent framework improvement programming focused no less than 20 major international technology companies with a second-stage payload.

Prior this week, when the CCleaner hack was reported, researchers assured users that there’s no second stage malware utilized as a part of the monstrous attack and influenced clients can basically refresh their adaptation so as to dispose of the malicious software.

In any case, amid the investigation of the programmers’ command and-control (C2) server to which the malicious CCleaner versions associated, security specialists from Cisco’s Talos Group discovered proof of a moment payload (GeeSetup_x86.dll, a lightweight secondary passage module) that was conveyed to a particular rundown of PCs in view of nearby area names.

 

Influenced Technology Firms

As per a predefined list said in the setup of the C2 server, the attack was intended to discover PCs inside the systems of the significant innovation firms and convey the auxiliary payload. The objective organizations included:

  • Google
  • Microsoft
  • Cisco
  • Intel
  • Samsung
  • Sony
  • HTC
  • Linksys
  • D-Link
  • Akamai
  • VMware

In the database, analysts found a rundown of about 700,000 backdoored machines contaminated with the malicious version of CCleaner, i.e. the principal arrange payload, and a rundown of no less than 20 machines that were tainted with the auxiliary payload to get a more profound a dependable balance on those frameworks.

The CCleaner programmers particularly picked these 20 machines in light of their Domain name, IP address, and Hostname. The scientists trust the optional malware was likely expected for industrial espionage.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Install Kali Linux on VirtualBox [Windows Host] in 2020

Kali Linux is a Debian based Linux distribution, released on the 13th March 2013 as a complete rebuild of BackTrack Linux. It is one of...

Acunetix v13 Release Introduces Groundbreaking Innovations

The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies London, United Kingdom – February 5, 2019 – Acunetix,...

What is Ethical Hacking, how to be an Ethical Hacker

Hacking is the process of discovering vulnerabilities in a system and using these found vulnerabilities by gaining unauthorized access into the system to perform...

Basic steps to ensure security Online!

Security concerns are growing day by day due to the growing interconnectivity and technology. Drastic things can happen if you be a little careless...