TechnoclinicTechnoclinic
  • Home
  • APPS
  • CAMERAS
    • PRINTERS
  • GAMING
    • LAPTOPS
  • HDTV
  • NEWS
  • PHONES
    • TABLETS
  • REVIEWS
  • SOFTWARE
  • Contact Us!
Search
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Reading: Hackers hid malware in CCleaner software
Share
Sign In
Aa
TechnoclinicTechnoclinic
Aa
Search
  • Home
  • APPS
  • CAMERAS
    • PRINTERS
  • GAMING
    • LAPTOPS
  • HDTV
  • NEWS
  • PHONES
    • TABLETS
  • REVIEWS
  • SOFTWARE
  • Contact Us!
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Technoclinic > SOFTWARE > Hackers hid malware in CCleaner software
SOFTWARE

Hackers hid malware in CCleaner software

Loknath Das
Last updated: 2017/09/18 at 4:40 PM
Loknath Das
Share
SHARE

Hackers have successfully breached CCleaner’s security to inject malware into the app and distribute it to millions of users. Security researchers at Cisco Talos discovered that download servers used by Avast (the company that owns CCleaner) were compromised to distribute malware inside CCleaner. “For a period of time, the legitimate signed version of CCleaner 5.33 being distributed by Avast also contained a multi-stage malware payload that rode on top of the installation of CCleaner,” says the Talos team.

CCleaner has been downloaded more than 2 billion times according to Avast, making it a popular target for hackers. Dubbed “crap cleaner,” it’s designed to wipe out cookies and offer some web privacy protections. 2.27 million users have been affected by the attack, and Avast Piriform believes it was able to prevent the breach harming customers. “Piriform believes that these users are safe now as its investigation indicates it was able to disarm the threat before it was able to do any harm,” says an Avast spokesperson.

AN UNUSUAL ATTACK ON SOFTWARE UPDATE MECHANISMS

This is an unusual attack as software similar to CCleaner is trusted by consumers and meant to remove “crapware” from a system. “By exploiting the trust relationship between software vendors and the users of their software, attackers can benefit from users’ inherent trust in the files and web servers used to distribute updates,” says Talos. The malware itself appears to have been designed to use infected PCs as part of a botnet.

Earlier this year, Ukrainian company MeDoc was breached and its update servers used to distribute the Petya ransomware. Hackers appear to be targeting these types of distribution points to more easily spread malware, instead of the traditional way of attacking individual machines themselves. It’s a trend that many security researches will be monitoring closely, to catch the latest innovative ways that hackers are breaching multiple systems.

Update, 8:30AM ET: Article updated with Avast statement.

[“Source-theverge”]

TAGGED: CCleaner, Hackers, hid, in, Malware, Software;

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Loknath Das September 18, 2017
Share this Article
Facebook Twitter Copy Link Print
Share
Previous Article Lenovo launches four new Android tablets
Next Article Vivo V7+ Review

Latest News

How to Prepare for the Mandatory Windows 11 Upgrade
LAPTOPS
How to Clean Your Flat-Screen TV The Right Way
HDTV
AI and Content Management: How Organizations Can Prepare for the Future
SOFTWARE
What is Application Software: Function and Features of Application
APPS
Case Study: Nissan and Teads’ Immersive Concept Car Campaign Transformed Scrolls into Stories
NEWS
Review of Hootsuite: Advantages, Drawbacks, Features, and Other Options
REVIEWS

Most Viewed Posts

  • Bengaluru Lady Turns Blinkit Conveyance Specialist For A Day And Her Choice Prompted Significant Changes In Application (1,240)
  • Choosing the Right Tablet for Blogging and Writing On the Go (1,159)
  • How to Start a Product Review Blog (Templates & Examples) (1,107)
  • How To Start A Review Blog and Get Free Review Products (1,096)
  • What You Need to Know About Smartphones vs. Tablet use of the Mobile Internet (1,075)

© 2023 TechnoClinic Network. TechnoClinic Company. All Rights Reserved.

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?