Endpoint

9/21/2017
04:05 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
100%
0%

CCleaner Malware Targeted Tech Giants Cisco, Google, Microsoft

The backdoor discovered in Avast's CCleaner targeted top tech companies including Google, Microsoft, Samsung, Sony, VMware, and Cisco.

When Cisco Talos and Morphisec discovered a version of Avast CCleaner had been compromised to deliver malware, it was bad enough to learn millions of endpoints were threatened. Now, security experts say the attackers had espionage in mind.

Earlier this week, both firms published research detailing the compromise of CCleaner version 5.33, which was available for download from August 15, 2017 until the release of v5.34 on September 12. The binary included in v5.33 contained a multi-stage malware payload to collect information including a list of running processes and all software installed on the machine.

Further analysis on the attack, published by Talos on Sept. 20, unearthed some concerning details.

Researchers acquired an archive of files stored on the attackers' command and control (C2) server, which contained code listing major organizations targeted with a second-stage loader. If a machine from one of those networks connected, it would be hit with a secondary payload.

"What happened is the attacker was using this giant net," says Craig Williams, senior technical lead at Cisco Talos. "In the four days the command and control server had data for, 700,000 victims connected with it … but [the attackers] only wanted a tiny fraction of them."

Analysis of the C2 tracking database, which spanned four days in September, revealed at least 20 victim machines hit with specialized secondary payloads. Targeted organizations included Microsoft, Google, HTC, Sony, Samsung, D-Link, Akamai, VMware, Linksys, and Cisco itself.

During that timeframe, the malware regularly contacted the C2 server to send information about infected systems. This included IP addresses, online time, hostname, domain name, process listings, and other data. Researchers believe attackers likely used this to determine which machines they should target during the campaign's final stages.

"This is pretty much exactly what we expected," says Williams. "It quite literally fits the definition of an APT."

Because Cisco Talos was only able to analyze four days of activity during the time CCleaner v5.33 was available for download, he continues, they have no idea how often this list of corporations was altered. They believe the target list was changed during the period the C2 server was active in order to compromise different businesses.

"When you hear two million machines were infected, it implies a commodity criminal," says John Bambenek, manager of threat systems at Fidelis Cybersecurity. "Now we're talking corporate environments, and it's hard to see that as anything other than an espionage attack."

Williams says the recommendations stay the same for affected businesses: systems should be wiped, restored from backup, or reinstalled. This is an example of why users need to have reliable backups amid the rise of supply-chain attacks.

"From the advent of this discovery, we had been warning users to recover from backups," he emphasizes. "We had been telling people, nobody knows what happened so you have to recover from backups."

Who did it?

Both Bambenek and Williams say the attack is well-made and likely the work of a sophisticated actor, though it's still unclear who it might be.

The contents of the Web directory taken from the C2 server included PHP files responsible for controlling communications with infected machines. One of these files, which contains core variables and operations used, specifies the People's Republic of China (PRC) as the time zone.

Williams says this does not mean Chinese actors are responsible. In fact, he believes the opposite. This is especially well-crafted malware, made with a significant amount of development time and complex database. If it really was China, why leave the timestamp?

"I suspect it's a false flag," he proposes, though it's hard to say for certain.

Interestingly, Bambenek points out, CCleaner was a curious choice for this victim pool.

"My first thought was, I'm not entirely sure how many of these enterprises would have used CCleaner," says Fidelis' Bambenek. "This is casting a broad net for an app you probably wouldn't find in enterprise environments."

While he says this may not be a particularly successful attack in terms of the hackers' true objectives, it shows threat actors are willing to think outside the box to achieve their goals.

"Two million infected computers is nothing to shake a fist at," he notes. "It shows they're willing to try new things and experiment. The adversary doesn't have complete visibility into what's typically used in enterprises. They need to make guesses."

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
Getting Up to Speed with "Always-On SSL"
Tim Callan, Senior Fellow, Comodo CA,  10/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Too funny!
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.