Czech cyber-security software maker Avast disclosed today a security breach that impacted its internal network.
In a statement published today, the company said it believed the attack's purpose was to insert malware into the CCleaner software, similar to the infamous CCleaner 2017 incident.
(With acknowledgements to posts at Wilders...)
Windows 10 Pro (64-bit), Panda DOME 18.7.4, MBAM3 Pro, Windows Firewall, OpenDNS Family Shield, SpywareBlaster, MVPS HOSTS file, MBAE Premium, MCShield, WinPatrol PLUS, SAS (on-demand scanner), Zemana AntiLogger Free, Microsoft EDGE, Firefox, Pale Moon, uBlock Origin, CryptoPrevent.
[I believe computer-users who sandbox (Sandboxie) are acting prudently.]
ATA stands for Microsoft Advanced Threat Analytics
Avast also changed the digital certificate it was using to sign CCleaner updates. The new update was signed with a new digital certificate, and the company revoked the previous certificate used to sign older CCleaner releases. It did so to prevent attackers from using it to sign fake CCleaner updates, in case the hackers managed to get their hands on the old certificate during the recent intrusion. The 2017 CCleaner hack happened before Avast bought Piriform.
Realtek USB and Audio drivers had similar problem which is why Realtek audio becomes broken after every windows feature update.
Doesn't say if they checked for malware in any of their other software like Speccy, which can be downloaded from the ccleaner.com site for free. Obviously ccleaner has a much wider distribution base but still...
Do we know if they use the same security certs for everything on their site?
I recently installed the latest version of Speccy, 1.32.740. So, is it or isn't it...??? 😟
Forum Member since 2004
I am not a Dell employee