
Piriform’s VP of products has gone into some technical detail regarding the hack here, writing that: “An unauthorized modification of the CCleaner.exe binary resulted in an insertion of a two-stage backdoor capable of running code received from a remote IP address on affected systems.” No people running the tool on Android devices were affected, according to Avast’s spokeswoman. So concerns had been raised about the very large potential number of affected devices.Īlthough it would appear that, in this instance, the illegal payload was only successfully delivered to a small minority of users - and specifically to those using 32-bit Windows PCs. “We estimate that 2.27 million users had the affected software installed on 32-bit Windows machines,” she further added.Īt the time of the acquisition, CCleaner was billed as having 130M users, including 15M on Android. It would have been an impediment to the law enforcement agency’s investigation to have gone public with this before the server was disabled and we completed our initial assessment,” it added.Ī spokeswoman for security giant Avast, which acquired the UK-based company back in July, told us: “We believe that these users are safe now as our investigation indicates we were able to disarm the threat before it was able to do any harm.” “Working with US law enforcement, we caused this server to be shut down on the 15th of September before any known harm was done.

“We have no indications that any other data has been sent to the server,” it writes. The malware was apparently capable of harvesting various types of data from infected machines - specifically, Piriform says: the computer name, IP address, list of installed software, list of active software and list of network adapters (data it describes as “non-sensitive”) - transmitting it to a third party computer server located in the US. So clearly some users may still have a compromised PC on their hands (Piriform says it’s moving all users of the CCleaner to the latest version of the software, while noting that users of CCleaner Cloud will have been updated automatically.)

The company is urging users to upgrade to version 5.34 or higher (which it says is available for download here). The affected versions of the software are CCleaner and CCleaner Cloud. Users of a free software tool designed to optimize system performance on Windows PCs and Android mobile devices got a nasty shock this morning when Piriform, the company which makes the CCleaner tool, revealed in a blog post that certain versions of the software had been compromised by hackers - and that malicious, data-harvesting software had piggybacked on its installer program.
