Get a Pentest and security assessment of your IT network.

News

Trojanized CCleaner Investigation: Lucky Break

Avast has recovered a nearly complete list of all firms targeted with second-stage malware via trojanized CCleaner installations. The command-and-control server used by attackers had a small hard drive, but it was only storing three days’ of attack data, listing 18 targeted companies. Avast says attackers had been backing up data off the server, before it apparently had crashed around Sept. 10. The backup server provides valuable new insights, because it tells researchers how many computers received secondary malware.”]

Source: https://www.cuinfosecurity.com/trojanized-ccleaner-investigation-lucky-break-a-10332

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Thousands of Magento websites compromised to serve malware

News

Office 365 Secure Score: An Introduction