CCleaner malware operators targeted tech firms involving Cisco, Microsoft, Samsung

as mentioned in File PhotoThe menace actors behind the Utilize of malware embedded in CCleaner have targeted big tech firms for their intellectual property. According to the safety team at Cisco Systems, Cisco was only 1 of many companies which hackers attempted to compromise. The CCleaner breach, discovered earlier this week, included cyberattackers modifying legitimate versions of the Programming to contain malware. The affected version is 5.33.6162, designed for 32-bit Windows machines, launched on August 15, as well as a version of CCleaner Cloud, launched on August 24. "The web server too contains a 2nd PHP file (init.php) which defines core variables and operations used," Cisco says.


CCleaner Malware Targeted twenty Tech Biggies involving Cisco, Intel, Microsoft, Samsung And More

The hacker group is assumed to be based out of China, and it's too known with other names involving Group 72, APT17, DeputyDog, etc. The similarities in the code were too spotted and mentioned in a report published with Cisco Talos – a menace intelligence group inside Cisco. They found the names of around twenty tech firms, involving Cisco, whom attackers wanted to exploit out of the malware. There are many high-profile companies affected, involving Cisco, Microsoft, Intel, Sony, Samsung, HTC, DLink, VMWare, etc. However, they have protected themselves from claiming which Group 72 is directly connected the CCleaner malware.

CCleaner Malware Targeted 20 Tech Biggies Including Cisco, Intel, Microsoft, Samsung And More

CCleaner malware targeted internal networks at Google, Microsoft, and Samsung

as mentioned in The malware attack on Windows utility CCleaner may have been further targeted and sophisticated than it seemed. New posts from Avast and Cisco's Talos study group detail the findings, as premier announced with Wired. Domains targeted with the CCleaner malware. "Ntdev.corp.microsoft.com" is an internal domain for Windows developers, while hq.gmail.com appears to be the internal Gmail instance for Google employees. Talos registered at least twenty computers that were targeted with the payload, however investigators haven't discovered that companies were involved.






collected by :Molly Tony

0/Post a Comment/Comments

Fixed Menu (yes/no)

Ads1

Widget Random Post No.

Ads2