![]() ![]() The only explanation is the malware was injected during the development phase or the signing process of the software. However, no one reported the corrupted checksum, that means the malware was not injected after the binary executable was created. When you download the free version of CCleaner, you will be provided with a checksum, after you download the software you will generate another checksum from the downloaded softare, if the two checksums don’t match, that means the downloaded software has been tampered and you shouldn’t install it. People think the malware was injected by hackers, but I don’t believe it is the case. My request for comment on this from Cisco’s Talos team has not been responded and I will update this post once I receive a response. Their release announcement and blog post seem to indicate that Piriform detected the malware themselves on September 12, 2017. ![]() Piriform, the company developed CCleaner, announced the security issue today, but interestingly without giving any credits to Cisco’s Talos team. On September 13, 2017, Cisco’s Talos cybersecurity reported that CCleaner has been distributed with malware for almost one month, and the infected version is the 32-bit version of CCleaner 5.33 which was released on August 15 and the 32-bit version of CCleaner Cloud released on August 24. ![]() The free version is at the top of the popular software list on. CCleaner is a popular and powerful PC tool that helps users to clean up their PCs by deleting temporary files, emptying recycle bins, deleting registry leftovers after program uninstall, etc. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |