Hello,
Still on the same subject:
Cisco Talos Intelligence researchers have discovered a second malware in the corrupted version of CCleaner. In addition to updating the software, they recommend restoring your PC.
Like a second layer inside. The second floor of a particularly vicious rocket. Earlier this week, security researchers at Cisco Talos Intelligence revealed that CCleanerâs widely used âcleaningâ software has been stealing a backdoor since mid-August. The malicious code appeared to have been placed there after an intrusion on Piriformâs network, publisher of the software. An upgrade to a cleaner and more recent version was strongly recommended.
Today, these same researchers are publishing a new document that contains the fruit of their ongoing investigation. Bad surprise, there was not one but two malicious âloadsâ in CCleaner. If Piriform strongly encourages the users of its program to carry out a new update, the advice of the researchers of Talos Intelligence goes a little further than that.
Go back, emergency
âThose affected by this attack should not simply remove the affected version of CCleaner or update it for the latest version,â they explain. Why ? Because after a first, then a second stage, the descent to the Underworld could continue. In fact, the contaminated computers may be by more than two malware now.
CCleaner users concerned âmust restore from a backup or a system image to ensure that they have completely removed not only the version of CCleaner containing the backdoor but any other malware that may reside on the system.â
In other words, the message is clear, it will have to go back in time, before August 15 and before you have installed the corrupted update (v 5.33 and following). Taking into account the figures provided by Pirifom, CCleaner records five million installations a week. It can therefore be estimated that about 30 million corrupted versions have been installed. Precautions are therefore necessary.
For September 12-16 alone, the Main Malware Control Center database indicated that just over 700,000 contaminated machines had logged in to take their orders. On the other hand, only about 20 PCs would have received the second malware, still during this period.
Some evidence of contamination
For the most worried of you, it is possible to find clues that will allow you to know if your machine is contaminated. First, registry keys are added by the Trojan from the second task.
HKLM \ Software \ Microsoft \ Windows NT \ CurrentVersion \ WbemPerf \ 001
HKLM \ Software \ Microsoft \ Windows NT \ CurrentVersion \ WbemPerf \ 002
HKLM \ Software \ Microsoft \ Windows NT \ CurrentVersion \ WbemPerf \ 003
HKLM \ Software \ Microsoft \ Windows NT \ CurrentVersion \ WbemPerf \ 004
HKLM \ Software \ Microsoft \ Windows NT \ CurrentVersion \ WbemPerf \ HBP
Moreover, you should also find traces of the specific files below.
GeeSetup_x86.dll dc9b5e8aa6ec86db8af0a7aa897ca61db3e5f3d2e0942e319074db1aaccfdc83
EFACli64.dll (Trojan horse in 64 bit version) 128aca58be325174f0220bd7ca6030e4e206b4378796e82da460055733bb6f4f
TSMSISrv.dll (the 32-bit Trojan horse) 07fb252d2e853a9b1b32f30ede411f2efbb9f01e4a7782db5eacf3f55cf34902
f0d1f88c59a005312faad902528d60acbf9cd5a7b36093db8ca811f763e1292a
DLL in the registry:
f0d1f88c59a005312faad902528d60acbf9cd5a7b36093db8ca811f763e1292a
Second charge:
dc9b5e8aa6ec86db8af0a7aa897ca61db3e5f3d2e0942e319074db1aaccfdc83
In order to determine if a machine is infected, the following should be checked:
If an affected version is installed on the machine, the presence of the Windows registry key HKLM \ SOFTWARE \ Piriform can be verified on the system.
In case of compromise the machine will have communicated to the address ip 216.126.225.148_BAD_ or to one of the following domains:
⢠ab6d54340c1a [.] Com.BAD
⢠aba9a949bc1d [.] Com.BAD
⢠ab2da3d400c20 [.] Com.BAD
⢠ab3520430c23 [.] Com.BAD
⢠ab1c403220c27 [.] Com.BAD
⢠ab1abad1d0c2a [.] Com.BAD
⢠ab8cee60c2d [.] Com.BAD
⢠ab1145b758c30 [.] Com.BAD
⢠ab890e964c34 [.] Com.BAD
⢠ab3d685a0c37 [.] Com.BAD
⢠ab70a139cc3a [.] Com.BAD
If this is the case, the machine must be considered as potentially compromised and restored to a state prior to August 15, 2017, or preferably completely re-imaged
If these items are on your machine, you can only restore a backup or image of your operating system that was established before August 15th.
prior to 15 August.
A whole new dimension
The second discovery load also revealed that the malware targets specific companies, in order to steal sensitive data, according to all logic. The names of Cisco, Microsoft, Samsung, HTC and Sony are also found. But this list would have evolved over time and the life of this malware, advances Talos Intelligence, which specifies that several hundred machines dependent on government domain names have also been targeted.
This new information is even more worrying to security researchers because it identifies a âpossibly unknownâ actor with significant resources. Is this a group of hackers backed by a state or a big industrialist? Talos Intelligence does not say so. It is just stated in its communication that one of the files found on malware control center servers refers to the time zone of the Peopleâs Republic of China.
Engineers are careful not to say that this can not be enough to attribute this attack to Chinese hackers. Obviously.