- Jun 21, 2017
- 616
definitely no snake oil here : control panel > system & security > security & maintenance
.....
....
How do I remove it?
The malware was embedded in the CCleaner executable itself. Updating CCleaner to v5.34 removes the old executable and the malware. CCleaner does not have an auto-update system, so users must download and install CCleaner 5.34 manually.
Avast said it already pushed an update to CCleaner Cloud users, and they should be fine. The clean version is CCleaner Cloud 1.07.3214.
Anything else?
The malware executed only if the user was using an admin account. If you use a low-privileged account and installed CCleaner 5.33, you more not affected. Nonetheless, it is recommended that you update to version 5.34.
Why didn't antivirus software catch the infection?
The CCleaner binary that included the malware was signed using a valid digital certificate.
Because KIS deleted the file!So i just booted my Windows partition (x64 Win10) and Kaspersky tells me:
I block the access and delete the file, and after a few seconds Kaspersky tells me:
What does the malware do?
The malware — named Floxif — collects data from infected computers, such as computer name, a list of installed software, a list of running processes, MAC addresses for the first three network interfaces, and unique IDs to identify each computer in part.
Yes, i know A bit creepy it is detected as malware when it "shouldn't affect 64-bit systems". Or did i understand wrong?Because KIS deleted the file!
The installer has both 32 and 64 version inside it, so there should be a AV detection, even if your system is x64.Yes, i know A bit creepy it is detected as malware when it "shouldn't affect 64-bit systems". Or did i understand wrong?
If a company that you know and trust pushes a malicious update, and it is zero-day, there is not very much you can do to protect against it, other than to keep alert for strange activity, like cmd.exe and things like that. But there is no guarantee you will see a sign of malware activity.Whats the solution for dig signed malware? We all see even Kasper sky failed! I think that cisco detected it first?
Cisco's Talos Intelligence Group Blog: CCleanup: A Vast Number of Machines at Risk
If a company that you know and trust pushes a malicious update, and it is zero-day, there is not very much you can do to protect against it, other than to keep alert for strange activity, like cmd.exe and things like that. But there is no guarantee you will see a sign of malware activity.
I guess Eset hips in paranoid mode can block this.HIPS
Step 1 of not getting backdoored, update slowI checked mine, and it was v5.24. My strategy of only updating CCleaner once a year has paid off.
HI Lockdown APPGUARD could block this malware?I mean if you have CCleaner on your machine and at the same time running appguard in the paranoid mode.
I guess Eset hips in paranoid mode can block this.