- youngthousands/Flickr (CC)
It turns out you can’t even trust your own antivirus provider not to infect your computer with malware.
Hackers managed to hijack a popular PC cleanup tool, CCleaner, meaning that anyone who downloaded or updated it between mid-August to mid-September also downloaded malware without realising it.
CCleaner is a popular piece of software used to clean up your PC by junking unnecessary files.
According to security firm Cisco Talos, hijackers effectively “bundled” malware in with a recent version of CCleaner. The malware allows hackers to potentially get access to the user’s computer, and other connected systems, to steal personal data or credentials.
“We confirmed that this malicious version of CCleaner was being hosted directly on CCleaner’s download server as recently as September 11, 2017,” the researchers wrote.
The trojan affected millions of users.
CCleaner was created by Piriform, which was acquired by Avast only in July. Avast is the biggest antivirus company outside China and, at the time of the acquisition, said CCleaner was used by 130 million people. In an update about the bug, Piriform estimated that up to 3% of its userbase was affected.
A spokeswoman additionally told Business Insider that Piriform estimated 2.27 million users had installed the infected software. “We believe that these users are safe now as our investigation indicates we were able to disarm the threat before it was able to do any harm,” she added.
One reason the attack is so devastating is because it takes advantage of consumer trust in the downloads from their antivirus provider. It’s the one place you’d expect to be safe from malware.
Talos’ researchers wrote: “By exploiting the trust relationship between software vendors and the users of their software, attackers can benefit from users’ inherent trust in the files and web servers used to distribute updates.”
Talos also speculated that the hijacking may have been an inside job, partly because the malicious code was code signed by Piriform. That essentially means the firm was guaranteeing its software was safe to download. That could mean an external hacker infiltrated the build process itself, or an insider “intentionally included” the malicious code.
Piriform said: “At this stage, we don’t want to speculate how the unauthorized code appeared in the CCleaner software, where the attack originated from, how long it was being prepared and who stood behind it.”
The firm added: “We apologise and are taking extra measures to ensure this does not happen again.” Piriform said it’s working with US law enforcement to determine who was responsible for the bug.
The bug affects anyone who downloaded CCleaner version 5.33 or updated their version between August 15 and September 12. Talos is advising anyone who’s worried to roll back their systems to a time before August 15, or reinstall them. They will also need to update to the latest version of CCleaner 5.34.