모든 토론 > Steam 포럼 > Off Topic > 제목 정보
🜂∴🜏 Cassie 2017년 9월 20일 오전 9시 01분
⚠️CCleaner Malware Fiasco (UPDATED)
:esc_warning: WARNING :esc_warning:

If any of you use CCleaner and have updated one month ago, update it now. Previous version 5.33 (ccsetup533.exe) had a trojan allowing backdoor access (Trojan.Floxif). Updating to the latest update version should remove it.

This infection was only present in the 32-bit binary, but if you do not know which one you have, update it anyway.

:esc_warning: UPDATE: Users with 64-bit version have detected malware on their versions as well. ALL CCleaner users please update for security.

News sources:

http://www.tomshardware.com/news/avast-unknowingly-bundled-malware-ccleaner,35477.html

https://www.bleepingcomputer.com/news/security/ccleaner-compromised-to-distribute-malware-for-almost-a-month/

http://searchenterprisedesktop.techtarget.com/blog/Windows-Enterprise-Desktop/CCleaner-533-32-bit-Carries-Malicious-Payload

:esc_warning: WARNING 2 :esc_warning:

CCleaner's 2nd payload of malware has been found.

The Trojan.Floxif left other backdoors open. Check your systems for these binary files:

  • GeeSetup_x86.dll
  • EFACli64.dll
  • TSMSISrv.dll
  • DLL in registry: f0d1f88c59a005312faad902528d60acbf9cd5a7b36093db8ca811f763e1292a

thehackernews.com님이 먼저 게시:
However, during the analysis of the hackers' command-and-control (C2) server to which the malicious CCleaner versions connected, security researchers from Cisco's Talos Group found evidence of a second payload (GeeSetup_x86.dll, a lightweight backdoor module) that was delivered to a specific list of computers based on local domain names.

[...]

Just removing the Avast's software application from the infected machines would not be enough to get rid of the CCleaner second stage malware payload from their network, with the attackers' still-active C2 server.
So, affected companies that have had their computers infected with the malicious version of CCleaner are strongly recommended to fully restore their systems from backup versions before the installation of the tainted security program.

blog.talosintelligence.com님이 먼저 게시:
Stage 2 Payloads

The stage 2 installer is GeeSetup_x86.dll. This installer checks the OS version and then drops either a 32-bit or 64-bit version of a trojanized tool. The x86 version is using a trojanized TSMSISrv.dll, which drops VirtCDRDrv (which matches the filename of a legitimate executable that is part of Corel) using a similar method to the backdoored CCleaner tool. The x64 version drops a trojanized EFACli64.dll file named SymEFA which is the filename taken from a legitimate executable that is part of "Symantec Endpoint". None of the files that are dropped are signed or legitimate.

Effectively, they patch a legitimate binary to package their malware. Additionally, the setup put an encoded PE in the registry :

HKLM\Software\Microsoft\Windows NT\CurrentVersion\WbemPerf\001
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WbemPerf\002
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WbemPerf\003
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WbemPerf\004

The purpose of the trojanized binary is to decode and execute this PE in registry. This PE performs queries to additional C2 servers and executes in-memory PE files. This may complicate detection on some systems since the executable files are never stored directly on the file system.

Within the registry is a lightweight backdoor module which is run by the trojanized files. This backdoor retrieves an IP from data stegged into a github.com or wordpress.com search, from which an additional PE module is downloaded and run.

[...]

:esc_warning: Below are indicators of compromise associated with this attack.

Installer on the CC: dc9b5e8aa6ec86db8af0a7aa897ca61db3e5f3d2e0942e319074db1aaccfdc83 (GeeSetup_x86.dll)

64-bit trojanized binary: 128aca58be325174f0220bd7ca6030e4e206b4378796e82da460055733bb6f4f (EFACli64.dll)

32-bit trojanized binary: 07fb252d2e853a9b1b32f30ede411f2efbb9f01e4a7782db5eacf3f55cf34902 (TSMSISrv.dll)

DLL in registry: f0d1f88c59a005312faad902528d60acbf9cd5a7b36093db8ca811f763e1292a

News sources:

http://thehackernews.com/2017/09/ccleaner-malware-hacking.html
http://blog.talosintelligence.com/2017/09/ccleaner-c2-concern.html

Stay safe, my friends.
These are dark times when we can't even trust programs like CCleaner anymore.


:esc_warning: Steam Inventory Helper (extension) reportedly spies on users :esc_warning:

News sources:

http://windowsreport.com/steam-spyware/

https://www.reddit.com/r/GlobalOffensive/comments/70xofs/warning_trusted_steam_inventory_helper_now/
🜂∴🜏 Cassie 님이 마지막으로 수정; 2017년 9월 21일 오전 4시 29분
< >
전체 댓글 89개 중 61~75개 표시 중
s 2017년 9월 20일 오후 8시 46분 
thx
chiefputsilao✖️ping 2017년 9월 20일 오후 8시 59분 
version 5.35 is out?
🜂∴🜏 Cassie 2017년 9월 20일 오후 9시 02분 
version 5.35 is out?
Is it? I will update my opening text then.
Volfogg 2017년 9월 20일 오후 11시 14분 
Oh, yuck...
Anti-virus found something.
Probably I had both versions.
Marsquatch 2017년 9월 20일 오후 11시 39분 
Malwarebytes still found Floxif on my PC despite me having the 64bit version of CCleaner. At least the virus was trivially easy to get rid of.
🜂∴🜏 Cassie 2017년 9월 21일 오전 3시 32분 
Swoocer님이 먼저 게시:
Malwarebytes still found Floxif on my PC despite me having the 64bit version of CCleaner. At least the virus was trivially easy to get rid of.
Edited my opening post to advise all users to update now.
🜂∴🜏 Cassie 2017년 9월 21일 오전 3시 41분 
chocolatelover67님이 먼저 게시:
Hey OP how do you do the little triangle thingy
⚠️ Phone emoji
:esc_warning: Steam Emoticon
🜂∴🜏 Cassie 2017년 9월 21일 오전 3시 44분 
chocolatelover67님이 먼저 게시:
R Λ i D Ξ N님이 먼저 게시:
⚠️ Phone emoji
:esc_warning: Steam Emoticon


Oh..... Where do I find the steam emojis?
You have to buy them or get them from crafting game badges. When you post, look at the smiley next to the "Post Comment" button. You can choose your emoticons from there.
🜂∴🜏 Cassie 2017년 9월 21일 오전 4시 26분 
:esc_warning: UPDATE: CCleaner's 2nd payload of malware has been found.

The Trojan.Floxif left other backdoors open. Check your systems for these binary files:
  • GeeSetup_x86.dll
  • EFACli64.dll
  • TSMSISrv.dll
  • DLL in registry: f0d1f88c59a005312faad902528d60acbf9cd5a7b36093db8ca811f763e1292a

News sources:

http://thehackernews.com/2017/09/ccleaner-malware-hacking.html
http://blog.talosintelligence.com/2017/09/ccleaner-c2-concern.html


I have updated the opening post with more information.
🜂∴🜏 Cassie 님이 마지막으로 수정; 2017년 9월 21일 오전 4시 26분
Volfogg 2017년 9월 21일 오전 5시 18분 
Huh...

So if I don't have any of these 4 I'm relatively safe?
Jej 2017년 9월 21일 오전 5시 18분 
Geez, it just gets worse and worse.
🜂∴🜏 Cassie 2017년 9월 21일 오전 5시 29분 
OCDavid님이 먼저 게시:
Huh...

So if I don't have any of these 4 I'm relatively safe?
In theory yes. They are still researching this, there may be more backdoors left open by this malware that have not been discovered yet. I will update this topic whenever I find more news, or someone informs me of such.
marijn211 2017년 10월 7일 오전 6시 04분 
Bruh I deactivated automatic updates just before this, scary thing is that I scan a lot for virusses and ccleaner is one of the only folders I have disabled for scanning
marijn211 님이 마지막으로 수정; 2017년 10월 7일 오전 6시 13분
🜂∴🜏 Cassie 2017년 10월 7일 오전 7시 29분 
Users like us aren't actually the main target for this backdoor though. Apparently infected users were just being used to get access to computers of major tech corporations.

https://www.wired.com/story/ccleaner-malware-targeted-tech-firms/
Jej 2017년 10월 7일 오전 7시 32분 
Anna Kist님이 먼저 게시:
I had CCleaner 5.33 (64-bit) installed for nearly a month and only upgraded after I heard this news. I searched for the suspect files, and fortunately I couldn't find them on my system. I'll keep doing daily scans with Malwarebytes for a while, just to be sure. But ♥♥♥♥ it, I can't be bothered reformatting... I have over 800gb worth of games installed on my computer, which took forever to download, and I ain't gonna do that again unless my computer gets seriously screwed.
I'd recommend getting a second smaller drive (or even just a second partition) for the system only.
That way if the OS is screwed you'll only have to worry about the OS itself as all your other files will be safely stored in the other drive/partition.
That is unless you get infected with a worm that spreads through multiple drives and hides itself in executables. In that case you're pretty much screwed.
Jej 님이 마지막으로 수정; 2017년 10월 7일 오전 7시 33분
< >
전체 댓글 89개 중 61~75개 표시 중
페이지당 표시 개수: 1530 50

모든 토론 > Steam 포럼 > Off Topic > 제목 정보
게시된 날짜: 2017년 9월 20일 오전 9시 01분
게시글: 89