The CCleaner hack that took place over the summer and came to light this week might have been carried out by an infamous cyber-espionage group, believed to be operating out of China, and which ...
Two members of Avast’s threat intelligence team shared new information about the CCleaner backdoor attack. MADRID—As the investigation continues into the backdoor planted inside CCleaner, two members ...
Version 5.33 of the CCleaner app offered for download between August 15 and September 12 was modified to include the Floxif malware, according reports published by MorphiSec and Cisco Talos. Floxif is ...
Update: On September 25, Avast confirmed that of the 18 companies targeted, a total of 40 computers were successfully infected with a secondary malware installation at the following companies: Samsung ...
The 32-bit version of CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 were infected with malware. Affected systems need to be restored to a state before Aug. 15, 2017, or reinstalled. Hackers ...
For about 22 days, the CCleaner system maintenance application distributed malware through its official channels. It appears to have been an exploit of the CCleaner installer’s download server, ...
Several major technology companies were targeted by malicious code injected into Avast-owned Piriform CCleaner software prior to release in a supply chain compromise. Earlier this week, Piriform said ...
A two-stage backdoor in digitally signed binaries of 32-bit CCleaner 5.33.6162 and CCleaner Cloud 1.07.3191 caused the sending of "non-sensitive data" to a server in the US. The issue has been fixed.