4/5/2023 0 Comments Ccleaner malware identified![]() The Mac and Android versions of CCleaner do not appear to have been affected.Īn Avast spokeswoman told Reuters that 2.27 million users had downloaded the infected version of CCleaner, and that 5,000 installations of CCleaner Cloud had received the tainted update to that software. The infected version of CCleaner Cloud was made available on Aug. 15, and its cleaned version, version 5.34, on Sept. The infected version of CCleaner, 5.33 for Windows, was made available for download on Aug. This data transfer from CCleaner appeared to be the malware, identified as Floxif, phoning home to its command-and-control servers. 12, which led to Piriform taking the server down. In a blog post from Paul Yung, VP of Products for Piriform, the exec noted that his company saw suspicious activity from "unknown IP address receiving data from software found in version of CCleaner" on Sept. Before that, though, Piriform already knew something fishy was going on. MORE: Best Antivirus Protection for PC, Mac and AndroidĪ report on this attack from technology company Cisco's Talos Intelligence blog notes that infected versions of CCleaner were observed "as recently as September 11," and that they alerted Avast of the issue on September 13. Following either (or both) of those steps, visit Piriform's site to download and install the latest, clean version of CCleaner. 15 snapshot of your system, or run a malware scan. ![]() 15 and you're running 32-bit Windows, you may be infected. In July of this year, Piriform was acquired by the Prague-based antivirus maker Avast. Those servers belonged to Piriform, the London company that created CCleaner. I also use the unpaid versions of Spybot and Malwarebytes - perhaps it's best to switch to using the Paid versions.The attack took place by piggy-backing onto CCleaner by infiltrating the servers that distribute the software, infecting version 5.33 of the Windows utility and version 1.07 of its cloud-based sister application. ![]() It was my Kaspersky (KIS version) that identified the CCleaner malware then deleted it. I've also used CCleaner for years on 64-bit with no problems. I have of course updated the software and run full AV scans with multiple scanners. However, I am disappointed and concerned that Piriform's configuration control and release processes allowed this fiasco to happen.įortunately, I use the 64-bit of CCleaner so I don't think any actual harm was done to my system. I've had plenty of other applications, and even some Windows Updates, do way more damage. I've been using CCleaner for years without a single system problem becoming apparent. No cleaners, uninstallers, etc.īut how do you gauge that potential? All kinds of applications dick around with the registry and various system files and you can't really know without reverse engineering the whole thing including the installer. However, I never use any third-party utilities that I think have a high potential to modify a Windows install in a way that might alter its configuration in a potentially harmful way. Nor would I, and I understand the attraction of such a utility. I certainly don't consider it "snake oil".
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |