Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

9/21/2017
04:05 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

CCleaner Malware Targeted Tech Giants Cisco, Google, Microsoft

The backdoor discovered in Avast's CCleaner targeted top tech companies including Google, Microsoft, Samsung, Sony, VMware, and Cisco.

When Cisco Talos and Morphisec discovered a version of Avast CCleaner had been compromised to deliver malware, it was bad enough to learn millions of endpoints were threatened. Now, security experts say the attackers had espionage in mind.

Earlier this week, both firms published research detailing the compromise of CCleaner version 5.33, which was available for download from August 15, 2017 until the release of v5.34 on September 12. The binary included in v5.33 contained a multi-stage malware payload to collect information including a list of running processes and all software installed on the machine.

Further analysis on the attack, published by Talos on Sept. 20, unearthed some concerning details.

Researchers acquired an archive of files stored on the attackers' command and control (C2) server, which contained code listing major organizations targeted with a second-stage loader. If a machine from one of those networks connected, it would be hit with a secondary payload.

"What happened is the attacker was using this giant net," says Craig Williams, senior technical lead at Cisco Talos. "In the four days the command and control server had data for, 700,000 victims connected with it … but [the attackers] only wanted a tiny fraction of them."

Analysis of the C2 tracking database, which spanned four days in September, revealed at least 20 victim machines hit with specialized secondary payloads. Targeted organizations included Microsoft, Google, HTC, Sony, Samsung, D-Link, Akamai, VMware, Linksys, and Cisco itself.

During that timeframe, the malware regularly contacted the C2 server to send information about infected systems. This included IP addresses, online time, hostname, domain name, process listings, and other data. Researchers believe attackers likely used this to determine which machines they should target during the campaign's final stages.

"This is pretty much exactly what we expected," says Williams. "It quite literally fits the definition of an APT."

Because Cisco Talos was only able to analyze four days of activity during the time CCleaner v5.33 was available for download, he continues, they have no idea how often this list of corporations was altered. They believe the target list was changed during the period the C2 server was active in order to compromise different businesses.

"When you hear two million machines were infected, it implies a commodity criminal," says John Bambenek, manager of threat systems at Fidelis Cybersecurity. "Now we're talking corporate environments, and it's hard to see that as anything other than an espionage attack."

Williams says the recommendations stay the same for affected businesses: systems should be wiped, restored from backup, or reinstalled. This is an example of why users need to have reliable backups amid the rise of supply-chain attacks.

"From the advent of this discovery, we had been warning users to recover from backups," he emphasizes. "We had been telling people, nobody knows what happened so you have to recover from backups."

Who did it?

Both Bambenek and Williams say the attack is well-made and likely the work of a sophisticated actor, though it's still unclear who it might be.

The contents of the Web directory taken from the C2 server included PHP files responsible for controlling communications with infected machines. One of these files, which contains core variables and operations used, specifies the People's Republic of China (PRC) as the time zone.

Williams says this does not mean Chinese actors are responsible. In fact, he believes the opposite. This is especially well-crafted malware, made with a significant amount of development time and complex database. If it really was China, why leave the timestamp?

"I suspect it's a false flag," he proposes, though it's hard to say for certain.

Interestingly, Bambenek points out, CCleaner was a curious choice for this victim pool.

"My first thought was, I'm not entirely sure how many of these enterprises would have used CCleaner," says Fidelis' Bambenek. "This is casting a broad net for an app you probably wouldn't find in enterprise environments."

While he says this may not be a particularly successful attack in terms of the hackers' true objectives, it shows threat actors are willing to think outside the box to achieve their goals.

"Two million infected computers is nothing to shake a fist at," he notes. "It shows they're willing to try new things and experiment. The adversary doesn't have complete visibility into what's typically used in enterprises. They need to make guesses."

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27621
PUBLISHED: 2020-10-22
The FileImporter extension in MediaWiki through 1.35.0 was not properly attributing various user actions to a specific user's IP address. Instead, for various actions, it would report the IP address of an internal Wikimedia Foundation server by omitting X-Forwarded-For data. This resulted in an inab...
CVE-2020-27620
PUBLISHED: 2020-10-22
The Cosmos Skin for MediaWiki through 1.35.0 has stored XSS because MediaWiki messages were not being properly escaped. This is related to wfMessage and Html::rawElement, as demonstrated by CosmosSocialProfile::getUserGroups.
CVE-2020-27619
PUBLISHED: 2020-10-22
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
CVE-2020-17454
PUBLISHED: 2020-10-21
WSO2 API Manager 3.1.0 and earlier has reflected XSS on the "publisher" component's admin interface. More precisely, it is possible to inject an XSS payload into the owner POST parameter, which does not filter user inputs. By putting an XSS payload in place of a valid Owner Name, a modal b...
CVE-2020-24421
PUBLISHED: 2020-10-21
Adobe InDesign version 15.1.2 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .indd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.