![]() ![]() There is further explanation on Talos' post how it was a sofisticated attack because whoever did it managed to put up a valid cert on the infected version of Ccleaner though, so there should be more information coming out as the investigation proceeds. The Avast install is optional and requires your consent. Which is to say, it could be embedded code that was inserted on 3rd party download websites. Answer (1 of 3): During the CCleaner Free installation process we sometimes give the option to install Avast antivirus. The investigation is still ongoing, but Piriform is saying that the issue has been solved, that no harm was done, and what seems like it didn’t originate from official CCleaner/Piriform sources. Working with US law enforcement, we caused this server to be shut down on the 15th of September before any known harm was done.” We have no indications that any other data has been sent to the server. From Piriform’s accessment, here’s the actual danger: “The compromise could cause the transmission of non-sensitive data (computer name, IP address, list of installed software, list of active software, list of network adapters) to a 3rd party computer server in the USA. No other Piriform or CCleaner products were affected.” From Piriform’s website: “This compromise only affected customers with the 32-bit version of the v of CCleaner and the v of CCleaner Cloud. If you are using 64-bit version, you are probably safe. This ONLY affects the 32-bit version of CCleaner and CCleaner Cloud, which accounts for some 3% of Piriform users. It's a registry and regular file cleaner software. This post is sorely lacking tons of information and the few that are in it are wrong.ĬCleaner is NOT a malware cleaning app.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |