![]() “We started working with law enforcement on late Tuesday afternoon, and we got the server shut down on Friday of last week. “The malicious code was a two-stage code, that is it has a rather innocuous component that transmitted some very basic non-personal data, but there was a second stage which allowed the server to transmit any executable to CCleaner for execution, and that’s the dangerous part,” Steckler said.Īfter finding it and getting the server shut down, Avast could safely announce what had happened without endangering vulnerable customers. Once the code was detected, Avast had to keep it under wraps so the culprit was unaware the company was on to the malware infection. ![]() ![]() Which, of course, we don’t own that server - it was part of a server farm - so we had to work with law enforcement to get that server shut down,” Avast CEO Vince Steckler told Digital Trends. “CCleaner is not a product that could be remotely updated like the other Avast products, which means in order to quote ‘fix’ it, we had to shut down the server that it was communicating with. Avast was made aware of the malicious code on September 12, but had to act quickly and covertly to neutralize the threat. Thankfully, if you update your CCleaner to the latest version, you should be fine. It appears to have been an exploit of the CCleaner installer’s download server, meaning that whenever anyone downloaded the software via official means, they also unwittingly downloaded a piece of malware. Fitbit Versa 3įor about 22 days, the CCleaner system maintenance application distributed malware through its official channels.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |