While the goal of a cyber-security attack, the company and the Czech counter-intelligence to say

PRAGUE (Reuters) – the Czech republic-based Avast and the Czech counter-intelligence service, BIS, said on Monday it had detected a network attack in the cyber-security company, and that the BIS is suspected of originating from China.

Avast said in a blog post that it found suspicious behavior on its network on Sept. 23 and the opening of an investigation, with the involvement of the BIS and the Czech police, in collaboration with an external forensics team.

The BIS said in a statement that the contribution of the foreign partners of the detected threat from the products of Avast!, a company that has been established in the Czech Republic.

“All of the analysis so far has revealed that the attack came from China, with the aim to take control of the most popular optimization tool, CCleaner, and also to the users’ computers,” the BIS said in a statement.

While, however, said they did not know who was behind the attack.

The Chief Information Security Officer, a vacuum cleaner that is called Jaya, he said the burglar, with the help of compromised credentials by creating a temporary VPN profile, you had to successfully gain access to the network. There have been several attempts between May 14 and Oct. 4, the vacuum cleaner called me.

While saying that the VPN profile is open to the keeping track of the cyber attacker. It is said that the attack was most likely aimed at Some of the software that are used to clean up unwanted programs, to speed up the devices, as in a previous case, in 2017.

The company said that it had been verified that there are no adverse changes have been made to previous versions of the software, and it is stopped, there will be new updates. He was pushing for a clean version of the software for the users, the Oct. 15 revocation of a previous certificate.

“With all of these precautions, we are confident to say that our Some of users are protected and are not affected by this,” Avast said.

“It is clear that this is a very sophisticated effort, as the intention was not to leave any traces of the intruder or the purpose, and that the actor was in progress, with an exceptional attention in order to not be recognized.”

Reporting by: Jan Wopatka; Editing by Michael Kahn and Hugh Lawson

Follow us

Don't be shy, get in touch. We love meeting interesting people and making new friends.

Most popular