DV Hardware - bringing you the hottest news about processors, graphics cards, Intel, AMD, NVIDIA, hardware and technology!
   Home | News submit | News Archives | Reviews | Articles | Howto's | Advertise
DarkVision Hardware - Daily tech news
July 9, 2020 
Main Menu
News archives

Who's Online
There are currently 84 people online.


Latest Reviews
Ewin Racing Flash gaming chair
Arctic BioniX F120 and F140 fans
Jaybird Freedom 2 wireless sport headphones
Ewin Racing Champion gaming chair
Zowie P-TF Rough mousepad
Zowie FK mouse
BitFenix Ronin case
Ozone Rage ST headset

Follow us

CCleaner gets hacked and malware downloader was injected into the install files

Posted on Monday, September 18 2017 @ 13:44:18 CEST by

CCleaner logo
If you've recently installed or updated CCleaner you need to check your system for malware immediately as developer Piriform got hacked. This popular system cleanup tool is reportedly used by 130 million people and receives about 5 million downloads per week.

Security researchers from Cisco Talos claim a vast number of machines are at risk as hackers added a backdoor to CCleaner that could be used to download malware, ransomware and keyloggers. The infected version of CCleaner was available for download via the official CCleaner server since September 11, 2017 and features a valid digital signature:
Cisco Talos noticed suspicious activity on 13 September, finding that "for a period of time, the legitimate signed version of CCleaner 5.33 being distributed by Avast also contained a multi-stage malware payload that rode on top of the installation of CCleaner."

Investigations by Talos revealed that the compromised version of the software had been available for download from the CCleaner server since 11 September, although an updated, non-compromised version was released a day later. The affected version was released back on 15 August, and it was signed using a valid certificate issued to Piriform Ltd by Symantec which was valid until October next year.
What makes it even more embarrassing is that Piriform was acquired by security company Avast! in July 2017.

Piriform blogged about the issue but downplays the severity. The company claims they were able to disarm the threat before it was able to do any harm:
We would like to apologize for a security incident that we have recently found in CCleaner version 5.33.6162 and CCleaner Cloud version 1.07.3191. A suspicious activity was identified on September 12th, 2017, where we saw an unknown IP address receiving data from software found in version 5.33.6162 of CCleaner, and CCleaner Cloud version 1.07.3191, on 32-bit Windows systems. Based on further analysis, we found that the 5.33.6162 version of CCleaner and the 1.07.3191 version of CCleaner Cloud was illegally modified before it was released to the public, and we started an investigation process. We also immediately contacted law enforcement units and worked with them on resolving the issue. Before delving into the technical details, let me say that the threat has now been resolved in the sense that the rogue server is down, other potential servers are out of the control of the attacker, and we’re moving all existing CCleaner v5.33.6162 users to the latest version. Users of CCleaner Cloud version 1.07.3191 have received an automatic update. In other words, to the best of our knowledge, we were able to disarm the threat before it was able to do any harm.
Users of CCleaner need to manually update to version 5.34 to ensure they're safe.



DV Hardware - Privacy statement
All logos and trademarks are property of their respective owner.
The comments are property of their posters, all the rest © 2002-2019 DM Media Group bvba