![]() The CCleaner tab lists the same option that you get when you run CCleaner directly on Windows PCs. You find several interesting options listed under Software including options to manage startup items and uninstall software on the selected computer system. Available for selection are popular apps like 7-Zip, Firefox and Notepad++ as well as options to install custom software using Dropbox. There is even an add software option to install custom software directly from the cloud. The information are comprehensive and similar to what Speccy reports when it is run on the PC. Software on the other hand lists information about the operating system, running processes, startup items and installed software. The core difference between the two is that the first requires input of username and password while the second does not (hand the second to your parents, family members or friends whose computer systems you manage). You may download account-specific or account-independent installers. Once that is out of the way you need to download installers for each computer system that you want to control using CCleaner Cloud. It may take a while before you get the invitation as the system is still invitation-based currently (it took a couple of hours in my case). The first thing you need to do to get CCleaner Cloud working is to create an account on the official site. Access requires a modern web browser only but no software installation on the control system so that you can control Windows PCs from Linux, Macs or other operating systems as well using CCleaner Cloud. The company has already apologized for the incident and says it’s “taking detailed steps internally so that this does not happen again.” At the very least, it would seem adding automatic updates to all future iterations of its products, including the free ones, would go a long way toward mitigating potential future threats.One of the core differences between regular CCleaner versions and CCleaner Cloud is that the control center has been moved to the web so that you can control one or multiple computer systems remotely. The company says the investigation is “still ongoing.” Is there anything else Piriform needs to do? ![]() It’s not yet clear, and Piriform is declining to speculate. You can download the newest version here. Piriform says users should update to CCleaner version 5.34 or higher. In other words, says the company, “to the best of our knowledge, we were able to disarm the threat before it was able to do any harm.” What version of CCleaner eliminates the malware? It has also contacted law enforcement and says it’s “worked with them on resolving the issue.” The company also says that “the threat has now been resolved in the sense that the rogue server is down, other potential servers are out of the control of the attacker, and we’re moving all existing CCleaner v users to the latest version.” The company has already updated both the online and downloadable versions of CCleaner. What is Piriform doing to remedy the problem? Piriform says it believes the 32-bit Windows version of CCleaner and version of CCleaner Cloud were modified illicitly before their release to users.Īccording to Avast, the malware attempts to transmit information like computer names, IP addresses, installed software, active running software, network adapter information and more, to a server located in the United States. Which versions of CCleaner have the malware? Regardless, if you’re running any version of CCleaner, you’ll want to ensure you’ve updated to the latest version immediately. But since the free version of the tool doesn’t appear to include automatic updates, it stands to reason that anyone running the free version is significantly more at risk, since these users would need to manually download the update. Am I at risk from malware?Īnyone specifically using the 32-bit Windows version of CCleaner is at risk. “There is no indication or evidence that any additional ‘malware’ has been delivered through the backdoor,” it added. “We believe that these users are safe now as our investigation indicates we were able to disarm the threat before it was able to do any harm,” the company said in a press statement. How many people are at risk?Īvast, the multinational cybersecurity firm that recently bought Piriform, says it believes the compromised software was installed on 2.27 million machines. ![]() After investigating further, it determined these versions were modified illicitly before their release to users. ![]() Piriform says it first detected a problem on September 12, when it noticed an unknown IP address receiving data from software found in recent versions of the software.
0 Comments
Leave a Reply. |