CCleaner a famous maintenance tool CCleaner has been hacked by a serious malware infection. Security Researchers at Cisco Talos have discovered that the downloaded server used by Avast (the company that owns CCleaner) included to spread the malware inside the CCleaner.
The Cisco Talos team said, “For a period of time, the legitimate signed version of CCleaner 5.33 being distributed by Avast also contained a multi-stage malware payload that rode on top of the installation of CCleaner”.
According to Security outfit Cisco Talos, CCleaner has been downloaded more than 2 billion times making it a popular aim for hackers. Named “crap cleaner” is designed to rub out cookies and offer some web privacy protections. 2.27 million users have been affected by the attack and Avast Piriform trust that it was capable to save the breach harming users.
An Avast spokesperson says, “Piriform believes that these users are safe now as its investigation indicates it was able to disarm the threat before it was able to do any harm”.
This is an abnormal attack on the software identical to CCleaner is used by customers and meant to remove ‘crapware’ from a system. Talos adds, “By exploiting the trust relationship between software vendors and the users of their software, attackers can benefit from users’ inherent trust in the files and web servers used to distribute updates”.
The malware itself appears to have been planned to use infected PCs as part of a botnet.
Previously on this year, a Ukrainian company MeDoc was the rupture and its modernize servers used to supply the Petya ransomware. Hackers appearing to be aiming these of kinds of distribution points to more easily spread malware. Instead of the traditional way of attacking individual machines themselves. It is a trend that many security pieces of research will be observing closely, to catch the latest modern ways that hackers are breaching numerous times.