15, meaning that millions of users are potentially at risk. The infected version of the software was released on Aug. The CCleaner app is very popular - Piriform claimed 2 billion CCleaner downloads and 5 million desktop installs weekly as of Nov. "At this stage, we don’t want to speculate how the unauthorized code appeared in the CCleaner software, where the attack originated from, how long it was being prepared and who stood behind it," Yung said. It's currently unknown who's behind the hack, or how they managed to sneak malware into official CCleaner installs. UTC According to Piriform, only 32-bit versions of the software are affected. Users of CCleaner Cloud version have received an automatic update." "The threat has now been resolved in the sense that the rogue server is down, other potential servers are out of the control of the attacker and we’re moving all existing CCleaner v users to the latest version. These two apps were "illegally modified before (they were) released to the public," the post said. In a blog post, the company's VP of Products Paul Yung said that another one of it software products, CCleaner Cloud (version ), has also been affected. This was confirmed by the app's maker, Piriform, which was acquired by anti-virus software maker Avast in July. The malware doesn't do much damage by itself, but opens up the possibility for hackers to remotely install other malware, with potentially devastating consequences. Beware, Google Play Store gets caught distributing malwareĪccording to Cisco Talos, only version 5.33 of the software is affected, and the more recent 5.34 version of CCleaner is malware-free.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |