
If you are using either of these two versions, remove this version and install the latest from Piriform. Visit the US-CERT site to read their release or sign up for future notifications. Updated versions, released on September 12 remediated. US-CERT followed with a release yesterday, September 19, to inform all of it's notification subscribers of the malware, now known as Floxif. 6162 and the August 24 update of CCleaner Cloud version were compromised with Floxif malware. Users of CCleaner Cloud version have received an. Solution Upgrade to a version of Piriform CCleaner Cloud that is later than. It is, therefore, affected by a malicious backdoor that allows remote attackers to obtain sensitive information and install unauthorized software. More information about the discovery and Piriform's statement can be found on their site. In a blog post this morning, Piriform exec Paul Yung writes, we’re moving all existing CCleaner v users to the latest version. Description The version of Piriform CCleaner Cloud installed on the remote Windows host is equal to. In other words, to the best of our knowledge, we were able to disarm the threat before it was able to do any harm. Users of CCleaner Cloud version have received an automatic update. Before delving into the technical details, let me say that the threat has now been resolved in the sense that the rogue server is down, other potential servers are out of the control of the attacker, and we’re moving all existing CCleaner v users to the latest version. Affected versions: CCleaner version and CCleaner Cloud version. The latest version is available for download here. We also immediately contacted law enforcement units and worked with them on resolving the issue. CCleaner users that are running older versions or that do not trust the one they are using now are encouraged to update their CCleaner software to version 5.34 or higher. Based on further analysis, we found that the version of CCleaner and the version of CCleaner Cloud was illegally modified before it was released to the public, and we started an investigation process. On September 18, Piriform released the following statement from their VP of Products, Paul Yung.Ī suspicious activity was identified on September 12th, 2017, where we saw an unknown IP address receiving data from software found in version of CCleaner, and CCleaner Cloud version, on 32-bit Windows systems.


Select CCleaner version and CCleaner Cloud version, then click Remove or Uninstall. The Programs and Features window will open. In the Open field, type 'appwiz.cpl', then press ENTER. The 64-bit version of CCleaner was not affected. In other words, to the best of our knowledge, we were able to disarm the threat. CCleaner is a free tool offered by Piriform, a subsidiary of Avast, used to wipe a computer's cache. Last week, Avast discovered CCleaner had a back door installed allowing attackers to gain access to computers with this program. To remove CCleaner, do the following: On your keyboard, press the Windows + R keys. Update: The exact versions that were infected were the 32-bit version of CCleaner and CCleaner Cloud. Users of CCleaner Cloud version have received an automatic update.
