![]() ![]() Interestingly, the technical specifications of the malware contain some elements which refer to the Peoples’ Republic of China time zone. ![]() Further analysis of Cisco Talos reveals the main targets of the virus. Depending on the OS, the malware dropped TSMSISrv.dll or EFACli64.dll. While the initial version attacked only 32-bit systems, the improved version attempted to assault 64-bit OS as well. After the discovery of the malware, its second payload was launched by the perpetrators. While more than 2 million ordinary users were said to have downloaded the backdoor, the developers took on a bigger challenge. What is more, the malware managed to postpone its activity for 601 seconds which again contributed to the evasion of detection. Thus, even cautious users failed to sense anything suspicious as the corrupted version included the name of the official, Piriform, publisher. The main culprit – Floxif malware – counterfeited the digital certificate of the application which granted it the label of a legitimate version. In case you have not updated the software from 5.33 to 5.34 version, do it now. Though the malware capabilities of spying on users data and data collection have been identified in the beginning, it seems that the initial target was a much bigger prey. ![]() Luckily, the deviation in usual behavior of eliminating malware was noticed by Cisco Talos experts. The real motive of Floxif virus delivered with CCleaner v5.33Ī couple of days ago, IT experts have made an astonishing discovery – CCleaner 5.33 version was delivering malware. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |