![]() In a blog post, Avast explains that many more machines were likely affected. "It's trying to get stuff into businesses through a backdoor." ![]() "There seems to be no targeting to consumers whatsoever," Steckler told CNN Tech. Avast CEO Vince Steckler said the second-stage attack targeted telecommunications firms, though did not release the company names.Ĭisco Talos also discovered the additional hacking attempts and published a list of companies potentially affected. Hackers infected trusted software and people downloaded it without realizing it contained malware.Īccording to research released late Wednesday, Avast found that hackers sent a "second stage payload" - or malware - in addition to what they sent already, to at least 20 machines in eight businesses. The strategy is similar to the major global NotPetya attack in June that targeted Ukrainian tax software, Williams added. "The bad guy could take any kind of malware he wanted, like ransomware, and push that down to end users." ![]() "The malware works like a loader," Williams said. In July, Avast acquired Piriform and said about 130 million people use CCleaner. Research indicated the hacker was collecting information, like reconnaissance, about infected computers, according to Talos researcher Craig Williams. Related: How the Equifax data breach happened: What we know now Researchers from security firm Cisco Talos, which detected the hack, call it a "supply chain attack." Attackers got into the original computer system where the software was built, and those who downloaded would have no way of knowing their computer was compromised
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |