![]() If you use CCleaner, here's what you need to know. Monday, the company that makes CCleaner, Avast's Piriform, announced that its free software was infected with malware. RELATED: The Ultimate Checklist Guide to Reinstalling Windows on Your PCĪlternatively, they say, you can reinstall Windows completely-yes, it’s a bit of a nuclear option, but it’s the only way to completely know your system is clean after an event like this.Computer-optimization software is supposed to keep your computer running smoothly. You should probably run an antivirus and MalwareBytes scan on your system and your backups to ensure no malware is left installed. While nothing immediately harmful was discovered, Cisco Talos recommends restoring your system to a state before Augfrom a backup if you were affected. If that key exists, it means you had the infected software on your system at one point in time.) What Should I Do? ![]() ![]() (If you’re comfortable going into the registry, you can open Registry Editor and navigate to HKLM\SOFTWARE\Piriform and see if there is a key labeled Agomo:MUID. If that version is 5.34 or later, your current version isn’t affected, but if you updated CCleaner in between August 15th and September 12th, and are on a 32-bit system, you may still have been affected. If that version is before version , then you are not affected, and you should manually download the latest version now. Open CCleaner and look in the top-left corner of the window-you should see a version number under the program name. If you are on a 32-bit version of Windows and think you might have downloaded CCleaner during the affected timeframe, here’s how to check what version you have. ( Update: A few days after this news broke, a second payload was discovered that affected 64-bit users-but it was a targeted attack against tech companies, so it’s unlikely most home users were affected.) Since many users likely use the 64-bit version of the application, and CCleaner Free does not automatically update, this is good news for a lot of people. Users running version of CCleaner or CCleaner Cloud , released on August 15th, 2017.Users running the 32-bit version of the application (not the 64-bit version).Thankfully, it looks like this malware only affected a certain subset of CCleaner users. You can read more technical info about the attack at Cisco Talos’ blog and at Piriform’s blog. Additional information whether the process is running with administrator privileges, whether it is a 64-bit system, etc.MAC addresses of first three network adapters.List of installed software, including Windows updates.In particular, according to Piriform, it created a unique identifier for the computer and collected: The malware did not actively harm systems, but it did encrypt and collect information that could be used to harm your system in the future. Since CCleaner claims to have millions of downloads per week, that is potentially a severe issue. The attack was described thusly by researchers at Cisco Talos: “the legitimate signed version of CCleaner 5.33.also contained a multi-stage malware payload that rode on top of the installation of CCleaner.” CCleaner’s parent company, Piriform (who was recently bought by terrible antivirus company Avast), acknowledged the issue shortly thereafter. RELATED: What Does CCleaner Do, and Should You Use It? Here’s how to tell if you were affected, and what you should do. CCleaner, the incredibly popular PC maintenance utility, has been hacked to include malware.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |