malware ccleaner

2.3 Million CCleaner Users Infected by Malware


In the event that you have downloaded or refreshed CCleaner application on your PC between August 15 and September 12 of this current year from its official site, at that point focus—your PC has been traded off.

CCleaner is a famous application with more than 2 billion downloads, made by Piriform and as of late obtained by Avast, that enables clients to tidy up their framework to upgrade and improve execution.

Security specialists from Cisco Talos found that the download servers utilized by Avast to give clients a chance to download the application were traded off by some obscure programmers, who supplanted the first form of the product with the noxious one and dispersed it to a large number of clients for around a month..This episode is yet another case of inventory network assault. Prior this year, refresh servers of a Ukrainian organization called MeDoc were likewise bargained similarly to disseminate the Petya ransomware, which wreaked ruin around the world.

Avast and Piriform have both affirmed that the Windows 32-bit rendition of CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 were influenced by the malware.

Avast and Piriform have both confirmed that the Windows 32-bit version of CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 were affected by the malware.

Detected on 13 September, the malicious version of CCleaner contains a multi-stage malware payload that steals data from infected computers and sends it to attacker’s remote command-and-control servers.


Recognized on 13 September, the pernicious rendition of CCleaner contains a multi-arrange malware payload that takes information from tainted PCs and sends it to aggressor’s remote charge and-control servers.


Besides, the obscure programmers marked the noxious establishment executable (v5.33) utilizing a substantial advanced mark issued to Piriform by Symantec and utilized Domain Generation Algorithm (DGA), so that if assailants’ server went down, the DGA could create new spaces to get and send stolen data.

“The greater part of the gathered data was scrambled and encoded by base64 with a custom letter set,” says Paul Yung, V.P. of Products at Piriform. “The encoded data was in this manner submitted to an outside IP address 216.126.x.x (this address was hardcoded in the payload, and we have deliberately conceal its last two octets here) by means of a HTTPS POST ask.”


The malignant programming was customized to gather an expansive number of client information, including:

  1. PC name
  2. Rundown of introduced programming, including Windows refreshes
  3. Rundown of every running procedure
  4. IP and MAC addresses
  5. Extra data like whether the procedure is running with administrator benefits and whether it is a 64-bit framework.

How to Remove Malware From Your PC

As per the Talos scientists, around 5 million individuals download CCleaner (or Crap Cleaner) every week, which demonstrates that more than 20 Million individuals could have been contaminated with the pernicious form the application.

“The effect of this assault could be serious given the amazingly high number of frameworks potentially influenced. CCleaner cases to have more than 2 billion downloads worldwide as of November 2016 and is apparently including new clients at a rate of 5 million seven days,” Talos said.

In any case, Piriform assessed that up to 3 percent of its clients (up to 2.27 million individuals) were influenced by the malevolent establishment.

Influenced clients are emphatically prescribed to refresh their CCleaner programming to rendition 5.34 or higher, keeping in mind the end goal to shield their PCs from being traded off.

0 thoughts on “2.3 Million CCleaner Users Infected by Malware”

Leave a Reply

Your email address will not be published. Required fields are marked *