Home News Hackers breached Avast's internal network through compromised VPN profile

Hackers breached Avast’s internal network through compromised VPN profile

Czech cyber-security software maker Avast disclosed yesterday a security breach that affected its internal network.

In a statement published yesterday, the company said it believed the attack’s purpose was to insert malware into the CCleaner software, similar to the infamous CCleaner 2017 incident.

Avast said the breach occurred because the attacker compromised an employee’s VPN credentials, gaining access to an account that was not protected using a multi-factor authentication solution.

The intrusion, detected on September 23, but there was evidence of the attacker targeting its infrastructure going as far back as May 14, this year.

“The user, whose credentials were apparently compromised […], did not have domain admin privileges. However, through a successful privilege escalation, the actor managed to obtain domain admin privileges,” said Jaya Baloo, Avast Chief Information Security Officer (CISO).

Staff eventually tracked down other security alerts inside Avast’s ATA dashboard, alerts that engineers previously ignored, thinking they were false positives. ATA stands for Microsoft Advanced Threat Analytics, an on-premise network parsing engine and traffic analysis system that Microsoft sells to enterprises in order to protect internal networks from malicious attacks triggered from inside.



The alert showed that the compromised user account replicated Avast’s Active Directory service, an effective digital map of the company’s internal network.

Avast let hackers roam free for two weeks to track their intentions

Baloo said Avast intentionally left the compromised VPN profile active, with the purpose of tracking the attacker and observing their actions.

This lasted until October 15, when the company finished auditing previous CCleaner releases, and pushed out a new clean update.

At the same time, Avast also changed the digital certificate it was using to sign CCleaner updates. The company revoked the previous certificate used to sign older CCleaner releases. It did so to prevent attackers from using it to sign fake CCleaner updates, in case the hackers managed to get their hands on the old certificate during the recent intrusion.

The last step was to reset all employee credentials

“Having taken all these precautions, we are confident to say that our CCleaner users are protected and unaffected,” Baloo said.

The antivirus maker said it is currently investigating the incident together with the Czech intelligence agency, Security Information Service (BIS), the local Czech police force cybersecurity division, and an external forensics team.

BIS also confirmed the investigation into the Avast hack today, claiming that Chinese hackers carried out the attack.



Avast said there is no evidence at this time to suggest that the same Chinese Hacker group caused the same attack that breached its infrastructure in 2017; however, the company pointed out that an experienced threat actor carried out the intrusion.

“From the insights we have gathered so far, it is clear that this was an extremely sophisticated attempt against us that had the intention to leave no traces of the intruder or their purpose, and that the actor was progressing with exceptional caution in order to not be detected,” Baloo said.

The investigation is ongoing and the company promised more updates

Avast previously received praises for the openness it showed while investigating the 2017 CCleaner hack, publishing several updates on the incident, as it continued to learn more about the 2017 breach in the subsequent months [1, 2, 3, 4].

The 2017 CCleaner hack happened before Avast bought Piriform, the company behind CCleaner. The Hackers breached Piriform’s network via TeamViewer account and planted malware inside CCleaner. The attackers, believed to be a group of Chinese state-sponsored hackers, inserted malware that would only download a second-stage payload if CCleaner were installed on the network of a major company. The list of targets included Cisco, Microsoft, Google, NEC, and many other major companies. Avast said that 2.27 million users downloaded the tainted CCleaner software back in 2017; 1,646,536 computers were infected with the first-stage Floxif trojan that scanned for high-value targets; but only 40 computers received the second-stage trojan, a more powerful backdoor.

Avast told it has no plans to discontinue CCleaner in light of the two attacks that targeted the app’s infrastructure.

Richard Sabinohttp://itspecialistdr.com
I like to share Information Technology News and how-to tips with all the people around me. I created this blog to reach the most people I can.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Must Read

Microsoft Azure Virtual Training Day: Fundamentals

(adsbygoogle = window.adsbygoogle || ).push({}); Today we're...

Eliminate background noise from conference calls with Krisp for free

Krisp is an AI-powered filter that virtually eliminates background noise, letting your work-from-home experience be a little more pleasant and professional.

Microsoft is offering free certification voucher

(adsbygoogle = window.adsbygoogle || ).push({}); If you have been desiring to...

How to share your Calendar in Outlook with someone else

(adsbygoogle = window.adsbygoogle || ).push({}); Have you ever been struggling in...

A San Francisco church file a lawsuit against Zoom claiming the company is failing to protect users

An online Bible study session has been victim of Zoom-bombing which led this San Francisco Church to file a lawsuit against Zoom...

Google removed 813 creepware apps from the Android Play Store

(adsbygoogle = window.adsbygoogle || ).push({}); NortonLifeLock and researchers from the New...

Microsoft stopped the release of Windows 10 32-Bit Build for new PC

(adsbygoogle = window.adsbygoogle || ).push({}); There are signals that Microsoft is...