Story image

Security firm reveals Asia connections behind the CCleaner hack

26 Sep 2017

New research from Avast Threat Labs suggests that the recent CCleaner supply chain hack was actually part of a plan to go after some of the world’s biggest companies, including many Asia Pacific firms.

According to the company’s blog, the attack was never intended for consumers, but instead went after companies such as NEC, Samsung, Asus, Fujitsu, Sony, Singtel, Intel and VMware.

The attack has now been called an Advanced Persistent Threat (APT) attack due to the nature of its communications with its Command and Control (C&C) server.

Researchers suspect the attack originated from China, because there were several code sequences to a previous APT attack known to have come from China.

An analysis of the times and dates of C&C connections suggest that the attacker or attackers were operating from Asia.

“Given the typical working day starts at 8AM or 9AM, this leads us to the most likely location of the attacker in the time zone UTC + 4 or UTC + 5, leading us to Russia or the eastern part of Middle East / Central Asia and India. Furthermore, given the clear lack of traffic on Saturdays and Sundays, it would indicate that it wasn’t an Arabic country,” researchers state.

The C&C server showed exactly what hosts it was communicating with through both the first and second payloads.

However, because CCleaner backup database failed after the server ran out of disk space, attackers managed to back up data from the crashed server to another one before rebuilding the database, Avast researchers say.

After analysing the database, researchers found that there were more than 5.6 million connections to the C&C server, equating to more than 1.6 million unique PCs.

40 unique PCs received the second payload. This, according to Avast researchers, is a ‘truly targeted attack’.

Out of the 40 PCs, Taiwan-based suffered the most, with 13 infected PCs. Japan-based was also hit, resulting in 10 infected PCs. A range of Samsung domains resulted in five infections, while Singapore telco Singtel and US-based tech firms Intel and VMware all suffered one infection each.

Attackers were interested in a number of other targets, however they were not infected by the second payload. Targets included htcgroup.corm, Linksys,, and US-based internet provider GoDaddy.

Avast researchers say they are still investigating the incident and have reached out to all affected companies.

“Proper investigation is in order and necessary to fully understand the impact and take remediation actions. From our side, we continue working on getting access and analyzing the additional stages of the payload (post stage 2),” researchers conclude.

Ping Identity offerings accelerates cloud MFA and SSO adoption
90% of respondents trust MFA as an effective security control to protect identity data in public clouds, yet only 60% of organisations have formally adopted it.
Trend Micro introduces cloud and container workload security offering
Container security capabilities added to Trend Micro Deep Security have elevated protection across the DevOps lifecycle and runtime stack.
Veeam joins the ranks of $1bil-revenue software companies
It’s also marked a milestone of 350,000 customers and outlined how it will begin the next stage of its growth.
Veeam enables secondary storage solutions with technology partner program
Veeam has worked with its strategic technology alliance partners to provide flexible deployment options for customers that have continually led to tighter levels of integration.
Veeam Availability Orchestrator update aims to democratise DR
The ability to automatically test, document and reliably recover entire sites, as well as individual workloads from backups in a completely orchestrated way lowers the total cost of ownership (TCO) of DR.
Nuix eyes legal sector as eDiscovery demand skyrockets
eDiscovery must encompass so much more than email and documents. If you haven’t looked at text messages and online chats, digital images, mobile devices, data in the cloud and social media, you’re not getting the whole story.
EXCLUSIVE: Forcepoint global channel chief talks strategy
As a solution sold 100% via the channel, cybersecurity solutions company Forcepoint places a strong emphasis on its partner relationships.
Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."