![]() The Security notifications further informed that both CCleaner v and CCleaner Cloud v were compromised. The tool was part of a “security incident” wherein the users were updated with a digitally signed version of the software that eventually opened a malicious backdoor. Most of us use CCleaner periodically as it would boost the PC performance, however, in a recent turn of events CCleaner is accused of injecting malware into the systems. However, besides the clean interface and the powerful features the CCleaner apparently also has a dark side. CCleaner is used by millions of internet users (including myself) in order to remove cookies and perform a cleanup. That and you don’t expect an antivirus firm to infect you with malware.CCleaner is arguably one of the most popular tools when it comes to getting rid of the temporary files and the other trash files that get accumulated on your PC and smartphone. Taking advantage of that trust is partially why this attack is so distressing. ![]() If you installed it, then go grab a clean version of CCleaner now if you intend to keep using the software.ĬCleaner has been popular for years, trusted by tech-savvy users. The freebie version won’t automatically update to a version without a backdoor. At the time of this writing that is version 5.34. Users should also update to the latest available version of CCleaner to avoid infection. ![]() Affected systems need to be restored to a state before August 15, 2017, or reinstalled. ![]() If even a small fraction of those systems were compromised, an attacker could use them for any number of malicious purposes. Cisco Talos said, “The impact of this attack could be severe given the extremely high number of systems possibly affected.” Piriform previously claimed that there have been 2 billion total CCleaner downloads with an additional 5 million weekly installs. It is also possible that an insider with access to either the development or build environments within the organization intentionally included the malicious code or could have had an account (or similar) compromised which allowed an attacker to include the code.” The backdoored version was even signed using a valid certificate issued to Piriform, which was acquired by antivirus firm Avast in July.Ĭisco Talos researchers said, “It is likely that an external attacker compromised a portion of their development or build environment and leveraged that access to insert malware into the CCleaner build that was released and hosted by the organization. A cloud version released in August was similarly infected. 15, and a newer version without compromised code wasn’t released until Sept. ![]() 13 while a customer was beta testing new exploit detection technology, warned that the tainted versions of CCleaner were being distributed for nearly a month. For nearly a month, two malware-tainted versions collected computer names, IP addresses, lists of installed and active software, as well lists of network adapters before sending the data to the attacker’s server.Ĭisco Talos, which discovered the malware on Sept. Hackers backdoored the popular CCleaner Windows utility. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |