Endpoint

9/21/2017
04:05 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
100%
0%

CCleaner Malware Targeted Tech Giants Cisco, Google, Microsoft

The backdoor discovered in Avast's CCleaner targeted top tech companies including Google, Microsoft, Samsung, Sony, VMware, and Cisco.

When Cisco Talos and Morphisec discovered a version of Avast CCleaner had been compromised to deliver malware, it was bad enough to learn millions of endpoints were threatened. Now, security experts say the attackers had espionage in mind.

Earlier this week, both firms published research detailing the compromise of CCleaner version 5.33, which was available for download from August 15, 2017 until the release of v5.34 on September 12. The binary included in v5.33 contained a multi-stage malware payload to collect information including a list of running processes and all software installed on the machine.

Further analysis on the attack, published by Talos on Sept. 20, unearthed some concerning details.

Researchers acquired an archive of files stored on the attackers' command and control (C2) server, which contained code listing major organizations targeted with a second-stage loader. If a machine from one of those networks connected, it would be hit with a secondary payload.

"What happened is the attacker was using this giant net," says Craig Williams, senior technical lead at Cisco Talos. "In the four days the command and control server had data for, 700,000 victims connected with it … but [the attackers] only wanted a tiny fraction of them."

Analysis of the C2 tracking database, which spanned four days in September, revealed at least 20 victim machines hit with specialized secondary payloads. Targeted organizations included Microsoft, Google, HTC, Sony, Samsung, D-Link, Akamai, VMware, Linksys, and Cisco itself.

During that timeframe, the malware regularly contacted the C2 server to send information about infected systems. This included IP addresses, online time, hostname, domain name, process listings, and other data. Researchers believe attackers likely used this to determine which machines they should target during the campaign's final stages.

"This is pretty much exactly what we expected," says Williams. "It quite literally fits the definition of an APT."

Because Cisco Talos was only able to analyze four days of activity during the time CCleaner v5.33 was available for download, he continues, they have no idea how often this list of corporations was altered. They believe the target list was changed during the period the C2 server was active in order to compromise different businesses.

"When you hear two million machines were infected, it implies a commodity criminal," says John Bambenek, manager of threat systems at Fidelis Cybersecurity. "Now we're talking corporate environments, and it's hard to see that as anything other than an espionage attack."

Williams says the recommendations stay the same for affected businesses: systems should be wiped, restored from backup, or reinstalled. This is an example of why users need to have reliable backups amid the rise of supply-chain attacks.

"From the advent of this discovery, we had been warning users to recover from backups," he emphasizes. "We had been telling people, nobody knows what happened so you have to recover from backups."

Who did it?

Both Bambenek and Williams say the attack is well-made and likely the work of a sophisticated actor, though it's still unclear who it might be.

The contents of the Web directory taken from the C2 server included PHP files responsible for controlling communications with infected machines. One of these files, which contains core variables and operations used, specifies the People's Republic of China (PRC) as the time zone.

Williams says this does not mean Chinese actors are responsible. In fact, he believes the opposite. This is especially well-crafted malware, made with a significant amount of development time and complex database. If it really was China, why leave the timestamp?

"I suspect it's a false flag," he proposes, though it's hard to say for certain.

Interestingly, Bambenek points out, CCleaner was a curious choice for this victim pool.

"My first thought was, I'm not entirely sure how many of these enterprises would have used CCleaner," says Fidelis' Bambenek. "This is casting a broad net for an app you probably wouldn't find in enterprise environments."

While he says this may not be a particularly successful attack in terms of the hackers' true objectives, it shows threat actors are willing to think outside the box to achieve their goals.

"Two million infected computers is nothing to shake a fist at," he notes. "It shows they're willing to try new things and experiment. The adversary doesn't have complete visibility into what's typically used in enterprises. They need to make guesses."

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance & Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
BlueBorne Attack Highlights Flaws in Linux, IoT Security
Kelly Sheridan, Associate Editor, Dark Reading,  12/14/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.