This problem hasn't re-occurred since then. Note: I'm guessing my CCleaner dump file was generated on 2 because I was unable to safely eject my USB thumb drive (the location of my CCleaner Portable files) after closing the CCleaner v6.04 interface and all open instances of File Explorer and had to kill the CCleaner64.exe process manually in Task Manager before I could eject my thumb drive. CCleaner Portable v6.04 still created the \Log subfolder (which currently contains 1 file called unp309859003616653267i-unhandled.mdmp) and the \Setup subfolder (which currently contains 1 file called f) so it looks like my Portable version is still capable of generating crash reports. dll library I keep after unzipping ccsetup xxx.zip is CCleaner64.exe (see image below). However, I use CCleaner Portable and do not have an executable called CCleanerBugReport.exe. I asked a similar question in my 2 topic Can I Disable New Reporting Tool in CCleaner v6.04?. It might be sensible to roll-back your computer to a backup created before you installed that poisoned version of CCleaner.Īnd, if you’re in any doubt as to the scale of the potential threat, cast your mind back a few months when ransomware spread around the world after being seeded through a malicious automatic update to a popular Ukrainian accounting software, or when in late 2016 attackers hijacked Ask Toolbar updates to install suspicious code.Are users certain that CCleanerBugReport.exe is part of the new reporting tool added to CCleaner v6.04, and if so does this executable automatically send crash reports back to the Avast / Piriform servers? After all, if you ran version 5.33 of CCleaner your PC may have been compromised. ![]() It’s worth pointing out that you may want to go one step further than just downloading a fixed version of CCleaner. (Of course, the lack of automatic updates for the free edition of CCleaner may actually have reduced the total number of users put at risk by the compromised version.) This message needs to especially get out to users of the free edition of CCleaner, as it does not feature automated updates and requires them to manually download updates. It goes without saying that anyone still using version 5.33 of CCleaner needs to update to the (safe) version 5.34 as soon as possible. Law enforcement agencies have also been informed of the situation, and the third-party server that was set up to receive stolen data has been taken down. It is also possible that an insider with access to either the development or build environments within the organization intentionally included the malicious code or could have had an account (or similar) compromised which allowed an attacker to include the code.”Ĭisco Talos researchers immediately informed Avast of the problem, and offending versions of the CCleaner installer containing the malicious payload are no longer available from the CCleaner download website. “…it is likely that an external attacker compromised a portion of their development or build environment and leveraged that access to insert malware into the CCleaner build that was released and hosted by the organization. ![]() ![]() What make things most concerning is that the malicious code was digitally signed using a valid digital certificate issued to the software’s developer Piriform, who were acquired by anti-virus firm Avast just two months ago.Ĭisco Talos researchers warn that the fact the binary was digitally signed using the software developer’s valid certificate is of particular concern: Researchers at Cisco Talos, who first identified the problem, discovered that the installer for CCleaner v5.33 – first delivered to users’ computers by the legitimate CCleaner download servers on Aug– was the culprit. ![]() The stolen data was then sent to a US-based server under the control of a hacker. Once in place, the malware would wait five minutes, determine if the user had admin privileges, and then steal information from PCs, such as the computer’s name, a list of installed software and Windows updates, running processes, MAC addresses of network adapters alongside additional information. As a security notification on CCleaner’s support forum explains, CCleaner v and CCleaner Cloud v were compromised.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |