Security Market Segment LS
Monday, 18 September 2017 21:05

Avast's CCleaner software used to spread malware


Malicious attackers have been using CCleaner, a popular application that allows Windows users to perform routine maintenance on their systems and has been downloaded more than two billion times, to spread malware, researchers from Cisco's Talos Intelligence Group say.

In a blog post, Talos said it had notified Avast, the owners of CCleaner, about the issue on 13 September. The malware can download other components like ransomware.

The attackers were using version 5.33 of CCleaner to spread a multi-stage malware payload. CCleaner had more than two billion downloads as of November last year. This version of CCleaner had a valid digital signature issued to Piriform, the company that makes CCleaner and which was recently acquired by Avast.

The presence of malware in CCleaner was first spotted by security firm Morphisec; however, they were late with a full write-up which has led to them being somewhat sidelined in the media.

Piriform's vice-president products Paul Yung issued a statement in which he said version 5.33.6162 of CCleaner, and CCleaner Cloud version 1.07.3191, on 32-bit Windows systems had been infected by malware by an unknown party.

"Users of CCleaner Cloud version 1.07.3191 have received an automatic update. In other words, to the best of our knowledge, we were able to disarm the threat before it was able to do any harm," he claimed.

An Avast spokesperson told iTWire that about 2.27 million people downloaded the affected version of CCleaner. But Talos said the impact of the attack could be more severe, given that CCleaner was reported to be adding five million new users a week.

"We estimate that 2.27 million users had the v5.33.6162 software, and 5010 users had the v1.07.3191 of CCleaner Cloud installed on 32-bit Windows machines. We believe that these users are safe now as our investigation indicates we were able to disarm the threat before it was able to do any harm," the spokesperson said.

The malicious payload included a domain generation algorithm as well as hard-coded command and control server functionality and was being hosted on the official CCleaner download servers as recently as 11 September.

The Talos team said it appeared that the affected version had been released on 15 August and was signed using a valid certificate issued to Piriform by Symantec.

When a second sample associated with the same threat was discovered, it was also found to be signed using a valid digital certificate. But the signing timestamp was 15 minutes after the initial sample was signed.

The Talos team said they had found a compilation artifact within the binary that they analysed. In view of these two factors, they said it was likely that an external attacker had compromised a part of the CCleaner development or build environment and inserted malware into the CCleaner build.

It was also possible that an insider had included the malware in the build or had an account compromised.

As far as the malware was concerned, once it had gained access to a Windows system, it ascertained whether the user in question was running as admin or not; if the latter, then the malware terminated its activity.

If the user had admin privileges, then the malware established a connection to a command and control server.

The domain generation algorithm in the malware generated a domain for each month and Talos detected an increase of activity to the domain which was generated for August, and later for that generated for September.

The team said it had registered these domains and sinkholed them to avoid their being used for any nefarious purpose.

Talos said: "In many organisations data received from commonly software vendors rarely receives the same level of scrutiny as that which is applied to what is perceived as untrusted sources. Attackers have shown that they are willing to leverage this trust to distribute malware while remaining undetected."

Subscribe to Newsletter here


Recently iTWire remodelled and relaunched how we approach "Sponsored Content" and this is now referred to as "Promotional News and Content”.

This repositioning of our promotional stories has come about due to customer focus groups and their feedback from PR firms, bloggers and advertising firms.

Your Promotional story will be prominently displayed on the Home Page.

We will also provide you with a second post that will be displayed on every page on the right hand side for at least 6 weeks and also it will appear for 4 weeks in the newsletter every day that goes to 75,000 readers twice daily.



It's all about Webinars.

These days our customers Advertising & Marketing campaigns are mainly focussed on Webinars.

If you wish to promote a Webinar we recommend at least a 2 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial.

For covid-19 assistance we have extended terms, a Webinar Business Booster Pack and other supportive programs.

We look forward to discussing your campaign goals with you. Please click the button below.


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.





Guest Opinion

Guest Interviews

Guest Research & Case Studies

Channel News