A clean version of CCleaner Cloud took a little while longer to be released, seeing the light of day on Sept. 12, with a new, uncompromised version of CCleaner being released the same day. Piriform said that Avast, its new parent company, had uncovered the attacks on Sept. Or better yet, make sure to uninstall the app and install the new, corrected version, which currently stands at. The nature of the attack code suggests that the hacker won access to a machine used to create CCleaner, Talos researcher Craig Williams said.ĬCleaner does not feature automatic updates, so if you make use of CCleaner, make sure to check your software version, and force an update through the app. Users would have noticed nothing wrong on their systems, since the entire malicious string of code was run under CCleaner's authentic digital certificate. Specifically, hackers embedded remote administration tools on CCleaner v and CCleaner Cloud v, tools that then tried to connect to several unregistered web pages, looking to download additional unauthorized programs, according to Cisco's Talos security research unit.
0 Comments
Leave a Reply. |