Wednesday, April 30, 2025
HomeData BreachCCleaner Got Hacked & Used For Distributing Malware that Infected ...

CCleaner Got Hacked & Used For Distributing Malware that Infected 2 Million Users

Published on

SIEM as a Service

Follow Us on Google News

A Most Famous Sofware  CCleaner Hacked and Distributing Floxif Malware from Download server of Leading Anti-Virus Vendor AVAST and more than 2 million Users Infected by this Malware.

CCleaner is a subsidy of AVAST that released legitimate signed version of CCleaner 5.33 with a Malicious payload that rode on top of the installation of CCleaner.

CCleaner is an application that allows users to perform routine maintenance on their systems. It includes functionality such as cleaning of temporary files, analyzing the system to determine ways in which performance can be optimized and provides a more streamlined way to manage installed applications.

CCleaner Estimated Downloads around 2 Billion by November of 2016  that meant to be one of the most Widely  Downloaded Software lists.

Also Read   Vevo Got Hacked by OurMine After Employee Questioned their Abilities

How Does CCleaner Hacked and Infect the Malware

A New exploit detection technology used by Cisco that conducted a Beta Test for their Customer that revealed a New Executable being Served in this Process.

- Advertisement - Google News

Cisco Talos Identified by further Analysis that the executable in question was the installer for CCleaner v5.33, which was being delivered to endpoints by the legitimate CCleaner download servers.

CCleaner Hacked
According to Cisco Talos, even though the downloaded installation executable was signed using a valid digital signature issued to Piriform, CCleaner was not the only application that came with the download.

This Malware included the 32 bit Binary has featured a Domain Generation Algorithm (DGA) as well as hardcoded Command and Control (C2) functionality During the installation of CCleaner 5.33.

Later, Floxif Malware gathers information such as computer name, a list of installed software, a list of running processes, MAC addresses for the first three network interfaces, and unique IDs infected systems and sends it back to its C&C server.

This version was signed using a valid certificate that was issued to Piriform Ltd by Symantec and is valid through 10/10/2018.

Malware Operation Performs 32-bit CCleaner v5.33 binary included with the legitimate CCleaner v5.33 installer, to call to the code.

CCleaner Hacked

Malware Operation FLow

“This was done to redirect code execution flow within the CCleaner binary to the malicious code prior to continuing with the normal CCleaner operations. The code that is called is responsible for decrypting data which contains the two stages of the malicious payload, a PIC (Position Independent Code) PE loader as well as a DLL file that effectively functions as the malware payload.”

This Help to Attacker to Evade the Detection from the malicious DLL that is being Executed.

If the user executing the malware does have administrative privileges on the infected system, SeDebugPrivilege is enabled for the process and Once the aforementioned activities have been performed, the malware then begins profiling the system and gathering system information which is later transmitted to the C2 server. Cisco Said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories

Cybersecurity researchers at Hunt have uncovered a server hosting advanced malicious tools, including SuperShell...

Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software

A sophisticated cyberattack targeted senior members of the World Uyghur Congress (WUC), the largest...

Konni APT Deploys Multi-Stage Malware in Targeted Organizational Attacks

A sophisticated multi-stage malware campaign, potentially orchestrated by the North Korean Konni Advanced Persistent...

Outlaw Cybergang Launches Global Attacks on Linux Environments with New Malware

The Outlaw cybergang, also known as “Dota,” has intensified its global assault on Linux...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Konni APT Deploys Multi-Stage Malware in Targeted Organizational Attacks

A sophisticated multi-stage malware campaign, potentially orchestrated by the North Korean Konni Advanced Persistent...

Outlaw Cybergang Launches Global Attacks on Linux Environments with New Malware

The Outlaw cybergang, also known as “Dota,” has intensified its global assault on Linux...

New Gremlin Stealer Advertised on Hacker Forums Targets Credit Card Data and Login Credentials

A formidable new information-stealing malware dubbed Gremlin Stealer has surfaced in the cybercrime underground,...