The Talos team quickly alerted Avast to the infection, and the security company moved to fix the situation by purging the hackers from its server and releasing a patched version of CCleaner; people with version 5.34 should be safe from the malware. In a shocking update, it was recently spotted that CCleaner has a major backdoor which can potentially affect 2 Billion people with 2.3 Million people reportedly affected. Users who downloaded CCleaner directly from the official site, as recently as September 11, were in fact downloading the infected version of the software.
If you use the popular utility program CCleaner to clean and optimize your PC, you'd better make sure to update to the latest version of the program. Users of our cloud version have received an automated update.
Piriform, which is owned by Avast, claimed it has managed to remove the compromised versions of CCleaner "before it was able to do any harm".
Jammu and Kashmir: Pakistan's ceasefire violation kills BSF soldier in Arnia sector
The Indian army says a border guard has been killed in cross-border fire from Pakistan in the disputed Kashmir region. The jawan, identified as identified as Captain Brijendra Bahadur Singh, was succumbed to his injuries.
CCleaner, which has a high ranting on Google Play and has been downloaded by more than 50 million Android users, was compromised "in a sophisticated manner" in August, and the problem was only spotted and fixed in mid-September.
Avast and Piriform have both confirmed that the Windows 32-bit version of CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 were affected by the malware. It disabled a rogue download server on September 15 as part of its cooperation with U.S. law enforcement's investigation. The affected versions of CCleaner and CCleaner Cloud were released on August 15 and August 24, respectively. Upon inspection, the researchers found that the CCleaner application was legitimate and had a valid digital signature from its makers, but it also contained a malicious payload. But the signing timestamp was 15 minutes after the initial sample was signed. The attack is effective as it exploits the assumed trust between a user and supplier.
The malware could also download and execute other malware, but Avast said it did not find evidence that attackers ever used this function. Avast then released a cleansed version of v5.33 on the same day and contacted USA law enforcement authorities. The malware forayed into the software by compromising the Avast's download servers' firewalls.
- Hurricane Maria Dominica Photos: Historically Strong Storm Causes 'Widespread Devastation'
- Zidane told me apart from Messi, I'm the best left footer - Asensio
- Hurricane Will Possibly Weaken Into Tropical Storm, Says NHC
- Apache Struts Security Flaw That Equifax Failed to Patch Responsible for Hack
- DW: Italian family die after falling into volcano
- Troll Level: Expert - Donald Trump Literally Takes Aim at Hillary on Twitter
- Altherr's grand slam lifts Phillies past Dodgers 4-3
- India says Rohingya refugees threat to national security
- Leishman in command at BMW golf
- Colorado's connection to NASA's Cassini mission to Saturn