![]() ![]() Since the only change I've made to my machine was the installation of CCleaner, it appears Avast AV installation file may have piggybacked on the CCleaner 3.34 (32-bit) download as the date and time of the installation are nearly identical. ![]() When I initiated a reboot – unrelated to the new CCleaner update since it's not required – Avast anti-virus software was automatically (and mysteriously) installed after the reboot. Last Tuesday (Sept 12), I downloaded the most recent version of the 32-bit CCleaner (v5.34) on a Windows 7 (32-bit) machine. Interesting news about CCleaner, which makes me wonder after an incident that occurred recently. Further details may be found at the report from Cisco Talos and at Bleeping Computer. AVAST intends to add a new signature to its antivirus scanners and will inform affected users. AVAST says, that 3 % of all CCleaner installs are effected – but this are 2.27 million affected machines. Newer versions of CCleaner are free of malware. The malware has been found in CCleaner version and CCleaner Cloud Version. According to the blog post, only 32 bit Windows version has been affected. Piriform has confirmed this incident today within a blog post. The installer was signed with a valid certificate. ![]() Talos assumes that the server through which the CCleaner installer was distributed was compromised. This happened from Augwith CCleaner 5.33 and from Augwith CCleaner Cloud 1.07. The malware then retrieved additional code from the malware server and transmitted data such as the IP address, computer name, installed software and existing network adapters to a server in the USA. This was published by a new report vom Cisco Talos. and Septemhas been delivered with an infected Floxif malware installer. Some versions of CCleaner app, downloaded between August 15. Some time ago, CCleaner was taken over by the Czech security company AVAST. This free system cleaner for Windows is often used by many users. ![]() What’s your PC cleaner tool of choice? Let us know on Twitter or Facebook.My credo is: keep your fingers off to system cleaners – but many users swear at CCleaner from Piriform. Related: How to tackle malware on a Windows PC In such cases, the onus of security rests on the software suppliers shoulders, but you can still help keep your cyber security defences up by ensuring you have anti-virus and anti-malware software from a reputable brand and keep that software updated. This form of cyber attack is known as a supply chain attack and is a particularly effective way to distribute malware as it exploits the trust between software providers and their users CCleaner has been a trusted tool for PC maintenance for years and as such many people wouldn’t imagine it harbouring malware. However, people with older versions of the tool may still be at risk, though there have yet to be any reports of the hackers using their hidden malware to cause problems and pinch private information. The Talos team quickly alerted Avast to the infection, and the security company moved to fix the situation by purging the hackers from its server and releasing a patched version of CCleaner people with version 5.34 should be safe from the malware. The Talos team said that the CCleaner 5.33 and CCleaner Cloud tools were infected and believe that around two million users are at risk from the malware, which has the potential to steal data. In an ironic turn of fate, software designed to help stop the spread of malicious code had been turned into a carrier of malware. Hackers have managed to insert malware into PC cleaning tool CCleaner, putting millions of users at risk from data theft and hack attacks.Ĭisco’s Talos cyber security team discovered that hackers had covertly infiltrated the servers of Avast, the cyber security software company that owns CCleaner, and added malware into a version of CCleaner as it was being built. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |