![]() It said the server was closed down on Sept. law enforcement to shut down a server located in the United States to which traffic was set to be directed. Williams said that Talos detected the issue at an early stage, when the hackers appeared to be collecting information from infected machines, rather than forcing them to install new programs. CCleaner does not update automatically, so each person who has installed the problematic version will need to delete it and install a fresh version, he said. This compromise only affected customers with the 32-bit version of the v of CCleaner and the v1.07. We resolved this quickly and believe no harm was done to any of our users. The nature of the attack code suggests that the hacker won access to a machine used to create CCleaner, Williams said. Infected CCleaner Software Attack that Affected 700,000 Customers is part of a Wide-scale State-sponsored Cyber-espionage Campaign. We recently determined that older versions of our Piriform CCleaner v and CCleaner Cloud v had been compromised. A new, uncompromised version of CCleaner was released the same day and a clean version of CCleaner Cloud was released on Sept. Piriform said that Avast, its new parent company, had uncovered the attacks on Sept. It advised users of CCleaner v and CCleaner Cloud v to download new versions.Ī spokeswoman said that 2.27 million users had downloaded the August version of CCleaner while only 5,000 users had installed the compromised version of CCleaner Cloud. In a blog post, Piriform confirmed that two programs released in August were compromised. “ There is nothing a user could have noticed,” Williams said, noting that the optimisation software had a proper digital certificate, which means that other computers automatically trust the program. Talos researcher Craig Williams said it was a sophisticated attack because it penetrated an established and trusted supplier in a manner similar to June’s “NotPetya” attack on companies that downloaded infected Ukrainian accounting software. At the time of the acquisition, the company said 130 million people used CCleaner.Ī version of CCleaner downloaded in August included remote administration tools that tried to connect to several unregistered web pages, presumably to download additional unauthorised programs, security researchers at Cisco’s Talos unit said. CCleaner is the main product made by London’s Piriform, which was bought in July by Prague-based Avast, one of the world’s largest computer security vendors. ![]() Here is what Piriform has stated on the matter: We recently determined that older versions of our Piriform CCleaner v and CCleaner Cloud v had been compromised. It cleans up junk programs and advertising cookies to speed up devices. Apparently, the 32-bit version of v of CCleaner and the v of CCleaner Cloud were breached. The malicious program was slipped into legitimate software called CCleaner, which is downloaded for personal computers and Android phones as often as five million times a week. San Francisco - Hackers broke into British company Piriform’s free software for optimising computer performance last month potentially allowing them to control the devices of more than two million users, the company and independent researchers said on Monday.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |