New Ccleaner # 5.34.6207

lmacri:
F 4 E:

Fwiw, I'm now using Wise Disk Cleaner as recommended by Whirlpool forum user jmatt....

...Solution for Wise Registry Cleaner being reported as a PUP and blocked by Antivirus

http://forum.wisecleaner.com/index.php?/topic/12384-solution-for-pupoptionalwiserc/?p=27062

Hi F 4 E:

After reading your post I was trying to figure out if Wise Disk Cleaner has the same cookie cleaning functionality as CCleaner (e.g., to exclude selected cookies from cleaning) and went to their official forum from a link on the home page at http:// www. wisecleaner.com/wise-disk-cleaner.html.  As soon as I started searching their user forum Norton reported a high risk intrusion attempt for Web Attack Fake Tech Suppot Website 73.  The summary for this detection states "This signature is designed to prevent access to sites that redirect users or perform actions to trick users into calling the scammer and installing misleading applications such as fake antivirus software."

I also read the article Solution for Wise Registry Cleaner being reported as a PUP and blocked by Antivirus from the last link you provided in your post explaining how users must create scan exclusions to prevent Malwarebytes from detecting and removing this software as PUP.Optional.WiseRC.

I think I'll just wait a few days and see if Avast releases any new information before I make a decision about whether it's time to ditch CCleaner.  That would be a shame because I've been a loyal Piriform customer for years.
-----------
32-bit Vista Home Premium SP2 * NS v22.10.0.10 * MB Premium v3.2.2 * CCleaner Free v5.34.6207

Hi, Imacri. I agree about not ditching CCleaner. I've used it for years without issues.

Re Wise Disk Cleaner, Kaspersky, MBytes and Zemana have all give it a clean bill of health and the recommendation comes from the user on Whirlpool who does malware removal, so I'm guessing it's safe !  yes

I've found a new vector here. If you use a scheduled task to run ccleaner (auto-elevate and also possibly auto-clean?) the task by default runs the 32-bit version (which automatically runs the 64-bit version) which would run the mal-code before anything else.

Theoretically 64-bit user who ran the 32-bit version for some reason (above or some other) may have the trace here instead:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Piriform\Agomo\

I also found a possible example of malware stage two:

https://forum.piriform.com/index.php?showtopic=48874post-79955-0-73923300-1505741179.png

Floxif is the detection for a Trojan that was bundled with a hacked version of CCleaner. Downloads of the 32-bit versions of CCleaner 5.33.6162 and CCleaner Cloud 1.07.3191 were modified by hackers who included a Trojan in the main CCleaner.exe executable. These malicious versions were available for download between between August 15 and September 12.

When these versions of CCleaner were executed on a 32-bit system, the Floxif malware would be executed and transmit various information back to a remote server.

https://www.bleepingcomputer.com/virus-removal/remove-floxif-ccleaner-trojan 

CCleaner v5.35.6210 released today.

Release Notes:

v5.35.6210 (20 Sep 2017)

- All builds signed with new Digital Signatures

Jim yes

Ondrej Vlcek, CTO of Avast, told SecurityNow that the point of the attack was to hurt Avast. "At this point, we don't know how long the infection was in place... but the attackers must have known that Piriform was about to be owned by Avast." He describes the infection as 'very skillfully designed' to remain cloaked and evade the standard procedure for testing new software for weaknesses before it goes out into the wild.

"My view is that whoever designed this (had) carefully analyzed where the backdoors should be, and then added multiple layers and sophistication to the infection," said Vlcek. "It evaded our sandboxing process, and was definitely a very innovative attack. It went unnoticed for about a month."

https://www.securitynow.com/author.asp?section_id=654&doc_id=736501&

F 4 E:

Fwiw, I'm now using Wise Disk Cleaner as recommended by Whirlpool forum user jmatt....

...Solution for Wise Registry Cleaner being reported as a PUP and blocked by Antivirus

http://forum.wisecleaner.com/index.php?/topic/12384-solution-for-pupoptionalwiserc/?p=27062

Hi F 4 E:

After reading your post I was trying to figure out if Wise Disk Cleaner has the same cookie cleaning functionality as CCleaner (e.g., to exclude selected cookies from cleaning) and went to their official forum from a link on the home page at http:// www. wisecleaner.com/wise-disk-cleaner.html.  As soon as I started searching their user forum Norton reported a high risk intrusion attempt for Web Attack Fake Tech Suppot Website 73.  The summary for this detection states "This signature is designed to prevent access to sites that redirect users or perform actions to trick users into calling the scammer and installing misleading applications such as fake antivirus software."

I also read the article Solution for Wise Registry Cleaner being reported as a PUP and blocked by Antivirus from the last link you provided in your post explaining how users must create scan exclusions to prevent Malwarebytes from detecting and removing this software as PUP.Optional.WiseRC.

I think I'll just wait a few days and see if Avast releases any new information before I make a decision about whether it's time to ditch CCleaner.  That would be a shame because I've been a loyal Piriform customer for years.
-----------
32-bit Vista Home Premium SP2 * NS v22.10.0.10 * MB Premium v3.2.2 * CCleaner Free v5.34.6207

Fwiw, I'm now using Wise Disk Cleaner as recommended by Whirlpool forum user jmatt.

Been using these for a long, long time, about 10 years on every comp I fix/work on.

Wise Disk Cleaner ( Run the 1st three tabs, left to right. I use default settings, leave boxes that are unchecked, unchecked ) Reboot when finished.
http://www.softpedia.com/get/System/Hard-Disk-Utils/Wise-Disk-Cleaner.shtml
http://www.freewarefiles.com/Wise-Disk-Cleaner_program_93075.html
http://www.freewarefiles.com/screenshot.php?programid=93075
http://www.wisecleaner.com/download.html
http://i.imgur.com/Jecnfvb.gif
http://i.imgur.com/0xHwdom.gif
http://fs5.directupload.net/images/170116/4dxbbi8v.gif
http://i.imgur.com/JZLYOLf.gif
http://i.imgur.com/4kfaeGW.gif

Wise Registry Cleaner ( Only use Registry Cleaner & with default settings. Don't use System Tuneup, that is for Experts, you really have to know what you are doing ) Reboot when finished.
http://www.softpedia.com/get/Tweak/Registry-Tweak/Wise-Registry-Cleaner.shtml
http://www.freewarefiles.com/Wise-Registry-Cleaner_program_89666.html
http://www.freewarefiles.com/screenshot.php?programid=89666
http://www.wisecleaner.com/wiseregistrycleanerfree.html
http://i.imgur.com/Qy7HWcA.gif
http://fs1.directupload.net/images/160910/vg3f4cq4.gif
http://fs1.directupload.net/images/160910/ye7lgtf2.gif
http://fs1.directupload.net/images/160910/sfbkb7se.gif
Solution for Wise Registry Cleaner being reported as a PUP and blocked by Antivirus
http://forum.wisecleaner.com/index.php?/topic/12384-solution-for-pupoptionalwiserc/?p=27062

lmacri:

The executives at Avast posted their own version of events today at Update to the CCleaner 5.33.6162 Security Incident which states:

"...as soon as we became aware of this issue, we engaged and solved it. Within approximately 72 hours of discovery, the issue was resolved by Avast with no known harm to our Piriform customers."

Too bad the timeline posted today by bleepingcomputer's Catalin Cimpanu at Avast Clarifies Details Surrounding CCleaner Malware Incident shows that it took over a month before Avast and Piriform even realized their v5.33 32-bit ccleaner.exe executable was infected.

What really ticks me off is that the change log for CCleaner v5.34 at http://www.piriform.com/ccleaner/version-history still says "Minor GUI improvements / Minor bug fixes".

Because they removed the malware in 5.33.0.6163? Change logs only covers intended changes to their software (as opposed to tampering)?

I hope we hear the full story soon.

The executives at Avast posted their own version of events today at Update to the CCleaner 5.33.6162 Security Incident which states:

"...as soon as we became aware of this issue, we engaged and solved it. Within approximately 72 hours of discovery, the issue was resolved by Avast with no known harm to our Piriform customers."

Too bad the timeline posted today by bleepingcomputer's Catalin Cimpanu at Avast Clarifies Details Surrounding CCleaner Malware Incident shows that it took over a month before Avast and Piriform even realized their v5.33 32-bit ccleaner.exe executable was infected.

What really ticks me off is that the change log for CCleaner v5.34 at http://www.piriform.com/ccleaner/version-history still says "Minor GUI improvements / Minor bug fixes".
-----------
32-bit Vista Home Premium SP2 * NS v22.10.0.10 * MB Premium v3.2.2 * CCleaner Free v5.34.6207

lmacri:

The infected 32-bit ccleaner.exe executable for v5.33 was signed by Piriform with a valid digital certificate, whitelisted by Norton and then given full (unrestricted) access through my Norton Smart Firewall between 15-Aug-2017 and 13-Sep-2017, so I'm still trying to figure out if there is any way I can figure out if data from my computer was sent back to the rogue servers at IP address 216.126.x.x.
-----------
32-bit Vista Home Premium SP2 * NS v22.10.0.10 * MB Premium v3.2.2 * CCleaner Free v5.34.6207

Almost certainly yes data was sent.

Computer name, IP, installed software, running software, MAC address for your network adaptors.

On the basis of that info the attacker could decide what (if any) malware to send you for stage 2.

lmacri:

Just a quick update that I did find the tell-tale registry entry HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\Agomo mentioned in Security Notification for CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 for 32-bit Windows users.

My Malwarebytes v3.2.2 Threat Scan came up clean yesterday with database v1.0.2835, but I ran a new Threat Scan today with the database v1.0.2843 and it finally detected the following stray registry entries left behind by the Floxif malware that was embedded in the 32-bit ccleaner.exe executable for v5.33:

Registry Value: 2
  Trojan.Floxif.Trace, HKLM\SOFTWARE\PIRIFORM\AGOMO|MUID, Quarantined, [8813], [436740],1.0.2843
  Trojan.Floxif.Trace, HKLM\SOFTWARE\PIRIFORM\AGOMO|TCID, Quarantined, [8813], [436739],1.0.2843

The infected 32-bit ccleaner.exe executable for v5.33 was signed by Piriform with a valid digital certificate, whitelisted by Norton and then given full (unrestricted) access through my Norton Smart Firewall between 15-Aug-2017 and 13-Sep-2017, so I'm still trying to figure out if there is any way I can figure out if data from my computer was sent back to the rogue servers at IP address 216.126.x.x.
-----------
32-bit Vista Home Premium SP2 * NS v22.10.0.10 * MB Premium v3.2.2 * CCleaner Free v5.34.6207

FWIW ~ https://www.us-cert.gov/ncas/current-activity/2017/09/19/Avast%E2%80%99s-Piriform-Releases-Security-Update-CCleaner

Given the system details that are sent back to the attacker, they could pick and choose which machines to deliver malware payload to (country/network A but not country/network B).

Update: It looks like they would know what antivirus was installed on each infected machine, they could skip delivering (or deliver a different) payload to those who had avast (or any other antivirus) installed.

Target:

32-bit computers only

Machines with computer names or name patterns of the attacker's choosing

Machines with IPs of the attacker's choosing (country/business/narrow/broad target list) -- could exclude by IPs

Machines with (or without) software installed (including antivirus) of the attacker's choosing

Machines with (or without) software (including antivirus) which is actively running of the attacker's choosing

 

 

So a hypothetical target to deploy the stage 2 malware (just an example) could be:

 

32-bit users only, only in Canada, excluding known avast network IPs, and anti-virus IPs, no IPs from Asia, no users with avast (protection) software installed, only users with quickbooks installed.

Yes we run 23 bit on my desktop so that Dottie can use her WIN 98 era Solitaire Suite!

Tablet is on 64b it Win 10AC Home because CU breaks the touchscreen function so I have it isolated from the internet to stop MS from force updating it again. Dottie uses it offline for some therapy programs. But it does have CCleaner on it so I'll check the version.

huwyngr,
Probably 5.33 - 32bit executable.    Desktop shortcut points to installed bitness.
Are you 32bit machine?

Full Path: e:\program files\ccleaner\ccleaner.exe

e:\ ?

bjm

If your Permalink was specifically to me, thanks. I looked where the quick scan directed me to and saw what I reported but looking specifically at Resolved and the details are there although dated today twice and not yesterday when the quick scan reported what it had done.

Filename: ccleaner.exe
Threat name: Trojan.Sibakdi
Full Path: e:\program files\ccleaner\ccleaner.exe

etc.

Thanks for the pointer but my note to Sunil still applies! 

Given the system details that are sent back to the attacker, they could pick and choose which machines to deliver malware payload to (country/network A but not country/network B). Sounds like they either didn't plan to distribute a payload or they had a very specific target in mind. No-one's seen this payload so either it didn't exist or they were very good at this.

Probably 5.33 - 32bit executable.    Desktop shortcut points to installed bitness.
Maybe, you retained 5.33 setup installer. 
for example
https://www.virustotal.com/#/file/1a4a5123d7b2c534cb3e3168f7032cf9ebf38b9a2a97226d0fdb7933cf6030ff/detection


....have you looked in Resolved Security Risks

For information regarding this event > from Norton pop-up > View Details > Copy to Clipboard &or from Norton history > More Options > Copy to Clipboard > paste.

It detected "a virus" on a quick scan yesterday and said it fixed it ..... just checked now that I'm catching up on post-IRMA messages and CCleaner is no longer on my machine!

My desktop shortcut is still there but puts up a windows error message about the file no longer being there and Open file location draws a blank ....

Nice to know what they removed with no indication of what the virus was ... or is it hidden somewhere other than the usual History place?

FWIW ~ https://betanews.com/2017/09/19/avast-ccleaner-hack/