Linked by Thom Holwerda on Tue 19th Sep 2017 09:58 UTC
Privacy, Security, Encryption

Talos recently observed a case where the download servers used by software vendor to distribute a legitimate software package were leveraged to deliver malware to unsuspecting victims. For a period of time, the legitimate signed version of CCleaner 5.33 being distributed by Avast also contained a multi-stage malware payload that rode on top of the installation of CCleaner. CCleaner boasted over 2 billion total downloads by November of 2016 with a growth rate of 5 million additional users per week. Given the potential damage that could be caused by a network of infected computers even a tiny fraction of this size we decided to move quickly. On September 13, 2017 Cisco Talos immediately notified Avast of our findings so that they could initiate appropriate response activities. The following sections will discuss the specific details regarding this attack.

Don't use registry cleaners. They serve no purpose.

Permalink for comment 649015
To read all comments associated with this story, please click here.
RE[2]: CCleaner is great
by kurkosdr on Tue 19th Sep 2017 18:33 UTC in reply to "RE: CCleaner is great"
Member since:

Any OS that need crappy tools like ccleaner to (attempt to) run properly... is fundamentally broken

No, it isn't great. Its a terrible sign that the registry was a terrible idea.

Yeah, because the Unix Way(tm) of spraying six letter text files all over the harddrive (some of them ending with a d) is such a better idea.

There is nothing magical about the registry folks, it's a place where apps can store data. Instead of having plain text spread all over the harddrive, you get a standard location, and you can have types (of course most unix people don't get types in stored data, that's why they want everything to be stored as a string and hate the concept of the registry)

Whether some apps bork their own stored data or don't clean them after install is not the OS's problem.

Any OS that needs "antivirus" software to become a "normal" setup .. is fundamentally broken.

Aka, any OS that allows root access (ClamAV, anyone?). Desktop Linux has the same "security advantage" Mac OS X had before the mid-2000s, aka it isn't profitable enough for malware crime rings to target. In fact, with security being lax all around Desktop Linux (for example, third-party .deb or .rpm packages are often not signed, scripts are never signed but often require root access and the Ubuntu updater has to be manually triggered by the user instead of being automatic) I wouldn't be surprised if Desktop Linux has it's own Flashback moment if it ever becomes profitable to do so for malware crime rings.

Edited 2017-09-19 18:37 UTC

Reply Parent Score: 4