{"id":93749,"date":"2017-09-19T13:11:41","date_gmt":"2017-09-19T13:11:41","guid":{"rendered":"http:\/\/sftarticles.wpenginepowered.com\/en\/?p=93749"},"modified":"2025-07-01T23:47:06","modified_gmt":"2025-07-02T06:47:06","slug":"ccleaner-has-been-hacked-update-now-if-you-havent-already","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/ccleaner-has-been-hacked-update-now-if-you-havent-already\/","title":{"rendered":"CCleaner Has Been Hacked: Update Now if you Haven&#8217;t Already"},"content":{"rendered":"<p>If you use CCleaner for Windows, <strong>update the application immediately<\/strong> because a backdoor for hackers has been installed on the software. This malware then allows them to install other dangerous programs, like ransomware or key loggers, onto the infected machines. According to Avast, who own CCleaner, 2.27 million users could have been affected by this incident. Avast are quick to add, however, that users should not worry.<\/p>\n<p>CCleaner is a file cleaning tool that has been downloaded 2 billion times and averages about <strong>5 million downloads a week<\/strong>. Cisco Talos, who discovered the vulnerability, raised the alarm on September 13<sup>th<\/sup> when version 5.33 of CCleaner triggered their detection systems.<\/p>\n<p>The affected version of CCleaner, that has the malware, was launched on August 15<sup>th<\/sup> but the latest version, <strong>version 5.34<\/strong>, which arrived on 12<sup>th<\/sup> September no longer has the problem. This is why it is important to update immediately if you\u2019re not using the latest version of CCleaner.<\/p>\n<h5 style=\"text-align: center\"><a href=\"https:\/\/ccleaner.en.softonic.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Download CCleaner<\/a><\/h5>\n<p>Piriform, the Avast subsidiary has called for calm. Piriform also informed users that <strong>CCleaner Cloud (web version of CCleaner) version 1.07.3191<\/strong> had also been infected by the same malware but that it has since been updated and the problem has already been solved.<\/p>\n<p><em>\u201cIn other words, to the best of our knowledge, we were able to disarm the threat before it was able to do any harm.&#8221;<\/em><\/p>\n<p>Piriform explained that the malware was preparing a second phase that would do something \u201cbigger\u201d but that they were able to shut it down before the second phase could launch.<\/p>\n<p>Some experts don\u2019t share Piriform\u2019s calm outlook, however. Martijn Grooten, Editor at Virus Bulletin said:<\/p>\n<p><em>\u201c<strong>This is very serious.<\/strong> Of course, it may be that they really only stole &#8230; &#8216;non-sensitive data&#8217; &#8230; but it could be useful in follow-up targeted attacks against specific users.&#8221;<\/em><\/p>\n<p>The <a href=\"http:\/\/blog.talosintelligence.com\/2017\/09\/avast-distributes-malware.html\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco Talos blog<\/a> spoke in a similar pessimistic tone:<\/p>\n<p><em>\u201cSupply chain attacks are a very effective way to distribute malicious software into target organizations. This is because with supply chain attacks, the attackers are relying on the trust relationship between a manufacturer or supplier and a customer. This trust relationship is then abused to attack organizations and individuals and may be performed for a number of different reasons.\u201d<\/em><\/p>\n<p>Nobody knows how the hackers have been able to pull this off. Talos suspect that it could even have been a <strong>Piriform employee<\/strong>.<\/p>\n<p>Curious about other options? Softonic Solutions has a list of the most popular <a href=\"https:\/\/solutions.softonic.com\/what-are-the-best-alternatives-to-ccleaner\">alternatives to CCleaner<\/a>.<\/p>\n<p>Via: <a href=\"https:\/\/www.theverge.com\/2017\/9\/18\/16325202\/ccleaner-hack-malware-security\" target=\"_blank\" rel=\"noopener noreferrer\">The Verge<\/a>,\u00a0<a href=\"https:\/\/www.anrdoezrs.net\/links\/7074958\/type\/am\/fragment\/4df5f73316a8\/https:\/www.forbes.com\/sites\/thomasbrewster\/2017\/09\/18\/ccleaner-cybersecurity-app-infected-with-backdoor\/\" target=\"_blank\" rel=\"noopener noreferrer\">Forbes<\/a>,\u00a0<a href=\"http:\/\/www.elmundo.es\/tecnologia\/2017\/09\/18\/59bfa7d722601d95448b45f0.html\" target=\"_blank\" rel=\"noopener noreferrer\">ElMundo<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you use CCleaner for Windows, update the application immediately because a backdoor for hackers has been installed on the software. This malware then allows them to install other dangerous programs, like ransomware or key loggers, onto the infected machines. According to Avast, who own CCleaner, 2.27 million users could have been affected by this &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/en\/ccleaner-has-been-hacked-update-now-if-you-havent-already\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;CCleaner Has Been Hacked: Update Now if you Haven&#8217;t Already&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2057,"featured_media":93750,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":1},"categories":[],"tags":[2398],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-93749","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-app-subdomain-redirectionccleaner"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/93749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/2057"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=93749"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/93749\/revisions"}],"predecessor-version":[{"id":328569,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/93749\/revisions\/328569"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/93750"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=93749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=93749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=93749"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=93749"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=93749"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=93749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}