Your Copy Of Avast’s ‘PC Cleaner’ CCleaner Could Be Full Of Malware, Update Now

Your Copy Of Avast’s ‘PC Cleaner’ CCleaner Could Be Full Of Malware, Update Now

According to its parent company Avast, more than 130 million people use the performance optimisation software CCleaner. And today all of those people need to be sure they have installed the latest update because some nasty malware has managed to make it into one of the builds.

Image Source: CCleaner

[referenced url=”https://gizmodo.com.au/2015/03/5-things-to-check-before-you-get-rid-of-your-old-gadgets/” thumb=”https://i.kinja-img.com/gawker-media/image/upload/t_ku-large/ttfiuui9kekoacwbb5q9.jpg” title=”5 Things To Check Before You Get Rid Of Your Old Gadgets” excerpt=”Whether you’re raising some funds on eBay or passing on your phone to a nephew or niece, you want to make sure you don’t leave any trace of your activities on there. You also need to make sure the new owner isn’t locked out by your old accounts. Here’s a simple checklist to work through before waving goodbye to an old phone, tablet or computer.”]

Piriform’s CCleaner was purchased by the popular anti-virus developer Avast back in July and, according to researchers at Cisco Talos, hackers were able to compromise the software just a month later. The Talos team noticed on September 13 that the installer for CCleaner v5.33 was triggering its malware protection systems. Upon inspection, the researchers found that the CCleaner application was legitimate and had a valid digital signature from its makers, but it also contained a malicious payload.

In a blog post published Monday, Talos’ researchers compared the malware packaged with CCleaner to the NotPetya ransomware that caused global havoc back in June. The payload contained a Domain Generation Algorithm and Command and Control functionality that could be used to send encrypted information about the computer back to a server controlled by the hackers. It appears to have the ability to download and run other binaries through a backdoor but the software’s maker claims that in its review it has “not detected an execution of the second stage payload and believe that its activation is highly unlikely”. In other words, the people behind CCleaner don’t think any of the 2.27 million people who downloaded and ran the 5.33.6162 version of CCleaner and the 1.07.3191 version of CCleaner Cloud have actually been harmed by this malware.

Piriform’s Paul Yung explains:

At this stage, we don’t want to speculate how the unauthorised code appeared in the CCleaner software, where the attack originated from, how long it was being prepared and who stood behind it. The investigation is still ongoing …

Again, we would like to apologise for any inconvenience this incident could have caused to our clients; we are taking detailed steps internally so that this does not happen again, and to ensure your security while using any of our Piriform products. Users of our cloud version have received an automated update. For all other users, if you have not already done so, we encourage you to update your CCleaner software to version 5.34 or higher, the latest version is available for download here. 

The Talos team claims that its likely an external attacker was able to compromise CCleaner’s build environment or that an insider at Piriform was responsible. No malicious software has been found in CCleaner 5.34, which was released on September 13. The malware was only present in the build that was released on August 15 (which has now been removed from the company’s download page). Anyone using the free version of CCleaner needs to manually download and update their software immediately.

[Cisco via Forbes]


The Cheapest NBN 50 Plans

It’s the most popular NBN speed in Australia for a reason. Here are the cheapest plans available.

At Gizmodo, we independently select and write about stuff we love and think you'll like too. We have affiliate and advertising partnerships, which means we may collect a share of sales or other compensation from the links on this page. BTW – prices are accurate and items in stock at the time of posting.