Update to the CCleaner 5.33.6162*Security Incident
https://blog.avast.com/update-to-the-ccleaner-5.33.6162-security-incident
Quote:
|
Some media reports suggest that the affected systems needed to be restored to a pre-August 15th state or reinstalled/rebuilt. We do not believe this is necessary. About 30% of CCleaner users also run Avast security software, which enables us to analyze behavioral, traffic and file/registry data from those machines. Based on the analysis of this data, we believe that the second stage payload never activated, i.e. the only malicious code present on customer machines was the one embedded in the ccleaner.exe binary. Therefore, we consider restoring the affected machines to the pre-August 15 state unnecessary. By similar logic, security companies are not usually advising customers to reformat their machines after a remote code execution vulnerability is identified on their computer.
|
Quote:
|
Customers are advised to update to the latest version of CCleaner, which will remove the backdoor code from their systems. As of now, CCleaner 5.33 users are receiving a notification advising them to perform the update.
|
__________________
1977 911S Targa 2.7L (CIS) Silver/Black
2012 Infiniti G37X Coupe (AWD) 3.7L Black on Black
1989 modified Scat II HP Hovercraft
George, Architect
Last edited by kach22i; 09-20-2017 at 08:01 AM..
|