

However, the company has no proofs if the third stage payload with ShadowPad was distributed to any of these targets.
#Ccleaner malware info install
Moreover, it was found that the attackers were then able to install a second-stage payload on 40 selected computers operated by major international technology companies, including Google, Microsoft, Cisco, Intel, Samsung, Sony, HTC, Linksys, D-Link, Akamai and VMware.
#Ccleaner malware info software
The malicious version of CCleaner had a multi-stage malware payload designed to steal data from infected computers and send it back to an attacker-controlled command-and-control server.Īlthough Avast, with the help of the FBI, was able to shut down the attackers' command-and-control server within three days of being notified of the incident, the malicious CCleaner software had already been downloaded by 2.27 million users.

September 13, 2017-Researchers at Cisco Talos detected the malicious version of the software, which was being distributed through the company's official website for more than a month, and notified Avast immediately. July 18, 2017-Security company Avast acquired Piriform, the UK-based software development company behind CCleaner with more than 2 billion downloads.Īugust 2, 2017-Attackers replaced the original version of CCleaner software from its official website with their backdoored version of CCleaner, which was distributed to millions of users. NET runtime library).īetween mid-April and July-During this period, the attackers prepared the malicious version of CCleaner, and tried to infiltrate other computers in the internal network by installing a keylogger on already compromised systems to steal credentials, and logging in with administrative privileges through RDP. However, we expect to learn more over the next few days and may well discover that it has impacted specific organizations.April 12, 2017-A few days later, attackers installed the 3rd stage payload on four computers in the Piriform network (as a mscoree.dll library) and a build server (as a.

No early reports indicate that it was “activated” in a way to cause malicious actions on end computers. ImpactĪt this point it is too early to know what impact the malware has had, if any.

We highly recommend that anyone that does not have IT managed services actively monitoring and fixing this, uninstall CCleaner themselves (or contact us) and then follow up with an antivirus scan, such as Webroot or MalwareBytes. CCleaner boasted over 2 billion total downloads by November of 2016 with a growth rate of 5 million additional users per week.įor our managed services customers, we are actively uninstalled CCleaner and running clean up scans immediately. On Monday, September 18th, Cisco’s Talos reported that the popular computer cleaning utility, CCleaner, was found to distributing Malware for about the last month.įor a period of time, the legitimate signed version of CCleaner 5.33 being distributed by Avast also contained a multi-stage malware payload that rode on top of the installation of CCleaner.
