Announcement

Collapse
No announcement yet.

CCleaner, popular on Windows, is infected with malware

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    CCleaner, popular on Windows, is infected with malware

    http://blog.talosintelligence.com/20...s-malware.html



    Update 9/18: CCleaner Cloud version 1.07.3191 is also reported to be affected

    On September 13, 2017 while conducting customer beta testing of our new exploit detection technology, Cisco Talos identified a specific executable which was triggering our advanced malware protection systems. Upon closer inspection, the executable in question was the installer for CCleaner v5.33, which was being delivered to endpoints by the legitimate CCleaner download servers. Talos began initial analysis to determine what was causing this technology to flag CCleaner. We identified that even though the downloaded installation executable was signed using a valid digital signature issued to Piriform, CCleaner was not the only application that came with the download. During the installation of CCleaner 5.33, the 32-bit CCleaner binary that was included also contained a malicious payload that featured a Domain Generation Algorithm (DGA) as well as hardcoded Command and Control (C2) functionality. We confirmed that this malicious version of CCleaner was being hosted directly on CCleaner's download server as recently as September 11, 2017.

    In reviewing the Version History page on the CCleaner download site, it appears that the affected version (5.33) was released on August 15, 2017. On September 12, 2017 version 5.34 was released. The version containing the malicious payload (5.33) was being distributed between these dates. This version was signed using a valid certificate that was issued to Piriform Ltd by Symantec and is valid through 10/10/2018. Piriform was the company that Avast recently acquired and was the original company who developed the CCleaner software application.
    ...
    Interestingly the following compilation artifact was found within the CCleaner binary that Talos analyzed:

    S:\workspace\ccleaner\branches\v5.33\bin\CCleaner\ Release\CCleaner.pdb

    Given the presence of this compilation artifact as well as the fact that the binary was digitally signed using a valid certificate issued to the software developer, it is likely that an external attacker compromised a portion of their development or build environment and leveraged that access to insert malware into the CCleaner build that was released and hosted by the organization. It is also possible that an insider with access to either the development or build environments within the organization intentionally included the malicious code or could have had an account (or similar) compromised which allowed an attacker to include the code.

    It is also important to note that while previous versions of the CCleaner installer are currently still available on the download server, the version containing the malicious payloads has been removed and is no longer available.
    I'm GLAD I have no need to use Windows.
    Last edited by GreyGeek; Sep 18, 2017, 10:46 AM.
    "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
    – John F. Kennedy, February 26, 1962.

    #2
    DDUUUHHH this waS ALL OVER THE "DARK WEB"A MONTH AGO...

    volunteers ARE NEEDED...INSTALL kALI.

    WOODGETTINGTIREDOFTHEWHOLETHINGANDGOINGBACKTOSNAIL MAILSMOKE

    aND "DARK WEB"...GIVE me a brfeak...give me a break...IT IS JUST THE PLACE WHERE STUPID PEOPLE ARE NOT

    Comment


      #3
      Wow! Thanks GG -- I have used CCcleaner on other people's Windows systems and it is normally a good tool, alongside Kasperksy and Malwarebytes. But none of them are immune from an insider hack.

      Comment


        #4
        Originally posted by dibl View Post
        Wow! Thanks GG -- I have used CCcleaner on other people's Windows systems and it is normally a good tool, alongside Kasperksy and Malwarebytes. But none of them are immune from an insider hack.
        Me too. It was my first recommendation for Windows users after I cleaned up their system. Being able to back up the register before making cleaning out caches, cookies and bad stuff was golden, even though I can't recall a single instance of losing data or a WinXX installation because of something CCleaner did. SpyBot was another good one until it was "monitized", then it because just another ad vector. Malwarebytes Pro was my recommendation for AV.

        Since Win10 came out I'm telling people that I don't disinfect Win10 because IT is malware, but I'd be glad to put Linux on their computer. Don't get many invitations these days because I've already switched most of my friends and family.
        "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
        – John F. Kennedy, February 26, 1962.

        Comment


          #5
          CCleaner, popular on Windows, is infected with malware

          Originally posted by woodsmoke View Post
          DDUUUHHH this waS ALL OVER THE "DARK WEB"A MONTH AGO...

          volunteers ARE NEEDED...INSTALL kALI.

          WOODGETTINGTIREDOFTHEWHOLETHINGANDGOINGBACKTOSNAIL MAILSMOKE

          aND "DARK WEB"...GIVE me a brfeak...give me a break...IT IS JUST THE PLACE WHERE STUPID PEOPLE ARE NOT
          I've been doing a LOT of P2P investigations and set up and investigated IPFS, I2P, ZeroNet and Freenet. After testing all of them I reluctantly uninstalled all of them for essentially the same reasons: Too few users, too few websites, too much traffic and too much legal exposure.

          Most of the websites I connected to on I2P, ZeroNet and Freenet were the home pages of newly installed nodes like mine. IOW, nearly every web page I visited looked exactly like mine. There was no content.

          IPFS is well funded ($50M) but mainly because it is tying up with BitCoin. I believe that BitCoin is a financial disaster waiting to happen.

          For all of them it is difficult to know what is on the other end of that big long key that is used to identify other websites. To solve that problem IPFS employs IPDN, but it hardly works at all. Essentially, you don't know what a webpage is offering until you jump to it by copying & pasting the key into your URL. Not very handy. Forget about "browsing" the web.

          I have a reasonably fast computer (6GB, i7 cpu, nvidia GPU, 1.3Tb of disk space and 70Mbps Internet). With all of them I had 400-700 peers uploading and downloading all the time. I had set them up to use 2Mb of my bandwidth, which is 30% of my upload speed. (My 100Mbps symmetrical fiber optic gets installed MONDAY! [emoji3] ) It put a noticeable drag on the performance of my laptop. KSysguard showed at least half my cores running at 100% all the time, and switching back and forth, which slows down operations even more.

          I2P had the prettiest GUI front end. It offered a listing of peers with graphics obtained from the peers, which gave "some" indication as to what was on the site, but it wasn't reliable. Most were merely default home pages.

          IPFS was the hardest to set up because of the number of ports one had to open up as connection points for various IPFS services. Freenet was the easiest to set up and run.

          All in all, if I were going to use a P2P technology it would be Freenet for one reason: "Friends". You can set Freenet to connect only to your set of friends and block any friend connections they may have to other people not in the group you want to connect to. IF I wanted to set up an encrypted end to end, secret Internet connection between myself and a group of people Freenet would be my tool.

          That final reason of legal responsibility could be used as a hammer against you. IF the authorities tracked pron to your computer because it was a node in a P2P mesh, even though you would not know it was there, they could and probably would prosecute you anyway because you would have/should have known that your computer could be/was used to store child porn, gov secrets, Jehadist plans, etc... What ever.

          IOW, IMO, P2P is not there, yet.

          When I want to browse secretly I use Tor, knowing full well it is probably compromised by any and all governments, and I am keeping my identity secret only from Joe and Sally Sixpack. And even though Tor can connect to oinion domains, I don't go there because they offer nothing I want to get that Amazon doesn't.

          #P2P#
          Last edited by GreyGeek; Sep 22, 2017, 07:59 AM.
          "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
          – John F. Kennedy, February 26, 1962.

          Comment

          Working...
          X