Among them, we can see Samsung, Sony, and even Cisco. Thus, on September 20th, the Talos team came up with a second analysis of the CCleaner malware.Īmong other things, they state that the primary target of the attackers was a list of famous companies and brands. The next step was to download the second payload to the infected system. The second payloadĪs it seems, the trojan wouldn't stop there. If you're interested in reading Talos' detailed analysis of the CCleaner malware, visit this link. Then, the trojan used a C2 server to upload the information it collected and download the first payload to the user's computer.
0 Comments
Leave a Reply. |