In this release we have included some important security updates and minor UI improvements and bug fixes.
General
Users on versions v5.57 through to v5.62 have been automatically updated to the new version to take advantage of its enhanced security and improved performance. Users will not notice any change to any of their product settings and can continue to use it as normal
"...After further analysis, we found that the internal network was successfully accessed with compromised credentials through a temporary VPN profile that had erroneously been kept enabled and did not require 2FA...
...Even though we believed that CCleaner was the likely target of a supply chain attack, as was the case in a 2017 CCleaner breach, we cast a wider net in our remediation actions.
On September 25, we halted upcoming CCleaner releases and began checking prior CCleaner releases and verified that no malicious alterations had been made. As two further preventative measures, we first re-signed a clean update of the product, pushed it out to users via an automatic update on October 15, and second, we revoked the previous certificate. Having taken all these precautions, we are confident to say that our CCleaner users are protected and unaffected..."
Users might recall a similar supply chain attack of July 2017 where an undetected Floxif trojan was successfully planted inside the CCleaner v5.33.6162 installer that was released to users and infected hundreds of thousands of 32-bit machines. See the BleepingComputer article Avast Clarifies Details Surrounding CCleaner Malware Incident for more information about this previous 2017 breach.