• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

Chitchat Huat Ah!? WIndows anti-virus software is ITSELF is A VIRUS !! 2.3 Millions Fucked

HongKanSeng

Alfrescian
Loyal
http://www.techtimes.com/articles/2...alware-into-the-app-infecting-2-3-million.htm

CCleaner Users, Update Right Now: Hackers Injected Malware Into The App, Infecting 2.3 Million

18 September 2017, 9:48 pm EDT By Aaron Mamiit Tech Times
Users of the popular Windows app CCleaner should immediately check if the software installed in their computers are of the latest version. Hackers have compromised one version of the program by injecting malware into its official installation package. ( Piriform )

Hackers have hijacked the popular Windows app CCleaner by injecting malware into the program, resulting in 2.3 million infected computers.

Users who have CCleaner installed in their PC are strongly advised to update the app to its latest version, as failure to do so could lead to greater cybersecurity risks.
CCleaner Malware Discovered

CCleaner, which had 2 billion downloads and 5 million desktop installations per week as of November 2016, has grown into a trusted software for system maintenance and optimization, capable of removing unnecessary data in computers with a few clicks. However, this is also a prime target for hackers who were able to compromise one version of the program.

The threat was discovered by Cisco Talos, which wrote in its blog post detailing the incident that CCleaner suddenly started triggering its advanced malware protection systems. Upon further investigation, the cybersecurity firm found that CCleaner version 5.33 as well as CCleaner Cloud version 1.07 hosted a backdoor that would allow hackers to distribute additional malware to infected computers.

One of the biggest problems with the incident is that the compromised versions of CCleaner were not distributed through third-party sources but were rather downloaded from the app's official website. The infected CCleaner apps were distributed on the website from Aug. 15 until Sept. 11, as version 5.34, which was released in Sept. 12, did not contain the malicious payload.
CCleaner: Should You Panic?

Piriform, the owner of CCleaner, tried to ease the concerns of the app's users. In a blog post written by the company's VP of product Paul Yung, he said that an investigation has been launched on how the CCleaner versions were compromised before they were released to the public, but in the meantime, it has already disarmed the threat before it did any significant damage.

The malware distributed through CCleaner sends information about the infected computers, including their name, installed programs, and running processes back to the server of the hackers. However, it appears that the malware was just the first phase of a larger attack that will never come.

Ondrej Vlcek, the chief technology officer of Avast, which owns Piriform, said that while the company is not downplaying the seriousness of the incident, users should not panic due to the CCleaner malware. Users should be protected from the second stage of the attack as long as they install the software's update, which is automatic for paid versions but require manual installation for free versions.

The bigger questions, however, are who is behind the malware that was injected into CCleaner and how they did it. Even bigger than that is the question of which software we can trust now when even the popular ones are in danger of being compromised.
 

dr.wailing

Alfrescian
Loyal
EU recommends.....

URL to download the EU report: http://www.europarl.europa.eu/RegData/etudes/STUD/2015/527409/EPRS_STU(2015)527409_REV1_EN.pdf

Pay particular attention to pages 52 and 53 of said report in which the EU recommended Qubes, OpenBSD and TAILS.

You might also wish to read the section "Technical options for mitigating surveillance risk" starting from page 45.

EP study: “EU should finance key open source tools”
URL: https://joinup.ec.europa.eu/community/osor/news/ep-study-“eu-should-finance-key-open-source-tools”
 

HongKanSeng

Alfrescian
Loyal
Re: EU recommends.....

URL to download the EU report: http://www.europarl.europa.eu/RegData/etudes/STUD/2015/527409/EPRS_STU(2015)527409_REV1_EN.pdf

Pay particular attention to pages 52 and 53 of said report in which the EU recommended Qubes, OpenBSD and TAILS.

You might also wish to read the section "Technical options for mitigating surveillance risk" starting from page 45.

EP study: “EU should finance key open source tools”
URL: https://joinup.ec.europa.eu/community/osor/news/ep-study-“eu-should-finance-key-open-source-tools”

thumbs-up-emoji.png
 
Top