If you use CCleaner, it’s worth taking a few minutes today to update to the latest version then scan your system using your favorite anti-virus/anti-malware tool. So far, we’ve had a good experience using it to clean up the registry, mostly on our internal test servers when it’s a time-saver to reuse an existing server to run a new version of the SAP BI platform.
SAP recommends CCleaner in KB 1372863 to obtain a clean uninstall of SAP BusinessObjects software and in KB 2037450 to obtain a clean uninstall of the Web Intelligence Rich Client. The problem appears to be limited to the 32-bit edition, not the 64-bit edition that you may have used to clean up your SAP BusinessObjects servers.
Zscaler Cloud Security Platform provides native SSL inspection.CCleaner, a popular utility for Microsoft Windows from Avast/Piriform, was recently compromised with malware. Over 60% of Internet traffic is over SSL, yet most advanced threats hide in SSL. SSL inspection is necessary to protect organizations. Here is a sample Cloud Sandbox report from one such detonation: Zscaler Cloud Sandbox successfully detected the payloads from this compromise. Zscaler added multiple signatures and indicators for blocking the original payloads as well as post-infection activity shortly after the information was disclosed to help any affected organizations in their remediation efforts.Ĭloud Sandbox provides the best line of defense in a proactive manner against these threats. How Zscaler Can Help with Preventative Measures The Zscaler team has been actively monitoring this issue over the past 72 hours and has added multiple protections to block the payloads as well as post-infection activity for the backdoor module.Īvast contacted all the impacted customers and revoked the legitimate certificate that was used to sign the compromised version of CCleaner package and issued an updated version of the package. It is important to note that the malicious CCleaner installer package was delivered using CCleaner’s software update infrastructure over HTTPS and was signed using a legitimate certificate.
Per Avast, 700K users downloaded and installed the compromised version of CCleaner, however, only the 20 users that belonged to the targeted organizations were served with a second stage payload. Users from a very targeted list of organizations including Microsoft, Cisco, Intel, VMware, Sony, etc., were the only ones to be served a second stage malware payload. The injected malicious code causes the compromised machine to communicate back to a predetermined C&C server (hardcoded IP addresses and DGA domains) to report infection and download a second stage malware payload. Attackers managed to compromise the software update infrastructure sometime in August 2017 and inject malicious code in the CCleaner update v5.33 and cloud version v1.07.
CCleaner is a very popular file system and registry clean up utility that optimizes performance by removing unneeded registry entries and files. The slim version has many of the larger programs features, which also includes the ability to clean your registry, which may be littered with files from apps and programs that you have long uninstalled.
Earlier this week, Avast, a multinational security software vendor, reported a compromise of their Windows system utility CCleaner. The biggest difference between the Ccleaner program and the Ccleaner slim version is that the slim version does not install the toolbar that the full Ccleaner has.