The Guardian Australia

CCleaner: 2m users install anti-malware program … that contains malware

- Alex Hern

More than two million users of anti-malware tool CCleaner installed a version of the software that had been hacked to include malware, the app’s developer confirmed on Monday.

Piriform, the developer of CCleaner now owned by security firm Avast, says that its download servers were compromise­d at some point between 15 August, when it released version v5.33.6162 of the software, and 12 September, when it updated the servers with a new version.

In that period, a trojan was loaded into the download package which sent “non-sensitive data” from infected users’ computers back to a server located in the US. The data, according to Piriform, included “computer name, IP address, list of installed software, list of active software, list of network adapters”.

As well as the data leak, however, the infection also resulted in a “second stage payload” being installed on to the affected computer – another piece of malware, which Piriform says was never executed.

“At this stage, we don’t want to speculate how the unauthoris­ed code appeared in the CCleaner software, where the attack originated from, how long it was being prepared and who stood behind it,” the company’s vice president, Paul Yung, said.

The company says 2.27m users were infected, but added that “we believe that these users are safe now as our investigat­ion indicates we were able to disarm the threat before it was able to do any harm”. By taking down the “command and control” server, Piriform may have prevented the infection being used to inflict further damage.

The breach was independen­tly discovered by Cisco’s Talos Intelligen­ce research team, who notified Piriform on 13 September, one day after the clean version of the software had been released in a regularly scheduled update. Talos recommends that affected systems be restored “to a state before August 15, 2017, or reinstalle­d”, advice which Piriform does not repeat.

Compromisi­ng downloads to trusted software is an increasing­ly common route by which malware authors infect devices. The method, known as a “supply chain” attack, works because “the attackers are relying on the trust relationsh­ip between a manufactur­er or supplier and a customer”, Talos says.

In March 2016, a compromise­d version of BitTorrent client Transmissi­on spread ransomware on Macs for three days, the first functionin­g ransomware attack on the operating system. Notoriousl­y, a successful hack on Ukrainian accounting software MeDoc was responsibl­e for seeding the NotPetya “ransomworm” – a self-replicatin­g piece of ransomware – that took down companies including Merck, Maersk and Cadbury’s.

Stolen nude photos and hacked defibrilla­tors: is this the future of ransomware?

 ??  ?? ‘At this stage, we don’t want to speculate how the unauthoris­ed code appeared in the CCleaner software, where the attack originated from, how long it was being prepared and who stood behind it,’ the Piriform’s vice president, Paul Yung, said....
‘At this stage, we don’t want to speculate how the unauthoris­ed code appeared in the CCleaner software, where the attack originated from, how long it was being prepared and who stood behind it,’ the Piriform’s vice president, Paul Yung, said....

Newspapers in English

Newspapers from Australia