Security Market Segment LS
Monday, 18 September 2017 21:05

Avast's CCleaner software used to spread malware


Malicious attackers have been using CCleaner, a popular application that allows Windows users to perform routine maintenance on their systems and has been downloaded more than two billion times, to spread malware, researchers from Cisco's Talos Intelligence Group say.

In a blog post, Talos said it had notified Avast, the owners of CCleaner, about the issue on 13 September. The malware can download other components like ransomware.

The attackers were using version 5.33 of CCleaner to spread a multi-stage malware payload. CCleaner had more than two billion downloads as of November last year. This version of CCleaner had a valid digital signature issued to Piriform, the company that makes CCleaner and which was recently acquired by Avast.

The presence of malware in CCleaner was first spotted by security firm Morphisec; however, they were late with a full write-up which has led to them being somewhat sidelined in the media.

Piriform's vice-president products Paul Yung issued a statement in which he said version 5.33.6162 of CCleaner, and CCleaner Cloud version 1.07.3191, on 32-bit Windows systems had been infected by malware by an unknown party.

"Users of CCleaner Cloud version 1.07.3191 have received an automatic update. In other words, to the best of our knowledge, we were able to disarm the threat before it was able to do any harm," he claimed.

An Avast spokesperson told iTWire that about 2.27 million people downloaded the affected version of CCleaner. But Talos said the impact of the attack could be more severe, given that CCleaner was reported to be adding five million new users a week.

"We estimate that 2.27 million users had the v5.33.6162 software, and 5010 users had the v1.07.3191 of CCleaner Cloud installed on 32-bit Windows machines. We believe that these users are safe now as our investigation indicates we were able to disarm the threat before it was able to do any harm," the spokesperson said.

The malicious payload included a domain generation algorithm as well as hard-coded command and control server functionality and was being hosted on the official CCleaner download servers as recently as 11 September.

The Talos team said it appeared that the affected version had been released on 15 August and was signed using a valid certificate issued to Piriform by Symantec.

When a second sample associated with the same threat was discovered, it was also found to be signed using a valid digital certificate. But the signing timestamp was 15 minutes after the initial sample was signed.

The Talos team said they had found a compilation artifact within the binary that they analysed. In view of these two factors, they said it was likely that an external attacker had compromised a part of the CCleaner development or build environment and inserted malware into the CCleaner build.

It was also possible that an insider had included the malware in the build or had an account compromised.

As far as the malware was concerned, once it had gained access to a Windows system, it ascertained whether the user in question was running as admin or not; if the latter, then the malware terminated its activity.

If the user had admin privileges, then the malware established a connection to a command and control server.

The domain generation algorithm in the malware generated a domain for each month and Talos detected an increase of activity to the domain which was generated for August, and later for that generated for September.

The team said it had registered these domains and sinkholed them to avoid their being used for any nefarious purpose.

Talos said: "In many organisations data received from commonly software vendors rarely receives the same level of scrutiny as that which is applied to what is perceived as untrusted sources. Attackers have shown that they are willing to leverage this trust to distribute malware while remaining undetected."

Subscribe to ITWIRE UPDATE Newsletter here

Active Vs. Passive DWDM Solutions

An active approach to your growing optical transport network & connectivity needs.

Building dark fibre network infrastructure using WDM technology used to be considered a complex challenge that only carriers have the means to implement.

This has led many enterprises to build passive networks, which are inferior in quality and ultimately limit their future growth.

Why are passive solutions considered inferior? And what makes active solutions great?

Read more about these two solutions, and how PacketLight fits into all this.


WEBINAR INVITE 8th & 10th September: 5G Performing At The Edge

Don't miss the only 5G and edge performance-focused event in the industry!

Edge computing will play a critical part within digital transformation initiatives across every industry sector. It promises operational speed and efficiency, improved customer service, and reduced operational costs.

This coupled with the new capabilities 5G brings opens up huge opportunities for both network operators and enterprise organisations.

But these technologies will only reach their full potential with assured delivery and performance – with a trust model in place.

With this in mind, we are pleased to announce a two-part digital event, sponsored by Accedian, on the 8th & 10th of September titled 5G: Performing at the Edge.


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News