Hackers Hid Malware In Ccleaner, A Free App Meant To Clean Out Computers

Triumph Motorcycle Forum - TriumphTalk

Help Support Triumph Motorcycle Forum:

This site may earn a commission from merchant affiliate links, including eBay, Amazon, and others.
I am not one that like this program but I know plenty of people that do use it, so if you are one of those you might want to check this out.

Source - Hackers hid malware in CCleaner, a free app meant to clean out computers

Play Video
29906170001_5398578398001_5398556711001-vs.jpg

These days, smartphones and tablets are just as vulnerable as regular computers, and malware is often used to subvert your private accounts. This video will tell you if your phone or tablet has a virus. Kim Komando

SAN FRANCISCO — Hackers hid malware in CCleaner, a popular app meant to clean out cookies and junk programs from Android phones and computers to make them run faster.

The malware was present in the program for four weeks before it was discovered by an outside security company. It has now been disarmed.

The discovery is especially galling because Piriform, the London-based company that makes the software, was acquired in July by Avast, a Czech Republic-based security software maker.

Morphisec, an Israeli security company. The compromised version of CCleaner was released on August 15 and was undetected for four weeks, "underscoring the sophistication of the attack," Morphisec vice president for research and development Michael Gorelik wrote in a blog post.

CCleaner advertises that "it protects your privacy and makes your computer faster and more secure!"

The company estimates that 2.27 million users had the affected software installed on Windows PCs. It believes the number is now reduced to 730,000 due to its efforts to upgrade customers.

Play Video
29906170001_5434485586001_5434478151001-vs.jpg

Ransomware has resulted in payments of millions of dollars in recent years as desperate users cough up the money to regain access to crucial files and data. Newslook

The discovery that the software had been illegally modified was made on September 12. The cloud-based version of the app was automatically updated.

Piriform encouraged all other users to update their CCleander software to version 5.34 or higher.

However, in a statement to USA TODAY the company emphasized that it believes it was able to disarm the threat before the malware was able to harm any of its customers.

Pirifom is investigating how its software creation process was infiltrated and compromise happened as well as who was behind ti attack. It is also working with U.S. law enforcement, it told USA TODAY in an email.

It has also moved production of its software to a secure infrastructure provided by Avast to further protect it from potential future attacks.
 

Latest posts

Back
Top