However, rather than speculate, we are focused on working with law enforcement to identify the perpetrators and prevent any damage caused by a second stage payload.” It is possible that this was the result of a State level attack or industrial espionage. So while the malware infected a total of 2.27M PCs between Augand Septemusing CCleaner version as its distribution vehicle - the attackers behind it appear to have been interested in only a specific subset of PC users working for tech firms.Īvast hasn’t published the names of specific companies targeted by the malware for, it says, “privacy reasons” - but says companies in Japan, Taiwan, UK, Germany and the US were targeted.Īsked whether it believes a state-level attacker was responsible for the malware, a spokeswoman for the company told us: “We are not excluding any possibility. In an update on its investigation into the malware, which was revealed to have affected 2.27M users of CCleaner earlier this week, Avast the security company which owns the London-based maker of the software, said the attack was an APT (advanced persistent threat) program that specifically targeted large technology and telecommunications companies. Malware that piggybacked on CCleaner, a popular free software tool for optimizing system performance on PCs, appears to have specifically targeted high profile technology companies and may have been an attempt to harvest IP - perhaps for commercial or state-level espionage.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |