Avast has recovered a nearly complete list of all firms targeted with second-stage malware via trojanized CCleaner installations. The command-and-control server used by attackers had a small hard drive, but it was only storing three days’ of attack data, listing 18 targeted companies. Avast says attackers had been backing up data off the server, before it apparently had crashed around Sept. 10. The backup server provides valuable new insights, because it tells researchers how many computers received secondary malware.”]
Source: https://www.cuinfosecurity.com/trojanized-ccleaner-investigation-lucky-break-a-10332