September 18, 2017

Malware hidden in CCleaner

Security experts found malware hidden in the popular CCleaner software

We are urging all of our clients to uninstall CCleaner from all workstations due to a recent malware injection found by security experts.  Hackers have successfully implemented malware into the app and have distributed it to millions of users.  Security researchers at Cisco Talos discovered that download servers used by Avast, which is the company that owns CCleaner, were compromised.

If you installed CCleaner before version 5.33, you're still at risk because the software can automatically update itself and by doing so, download the malware infected version of CCleaner from the software developers servers.  This hack is an unusual attack since CCleaner is trusted by consumers to remove adware, not install malware and compromise your digital security.

What happens to my computer if I become infected?

It's not fully understood what the malware does once your computer is infected, but that doesn't matter since it's always best practices to assume the worse.  We do know that your system joins a botnet of other infected computers used for several malicious tasks including Denial of Service Attacks.

What should I do if I have CCleaner installed?

Uninstall the software immediately!  If your computer is part of our managed IT services, we maintain your system, and you don't need CCleaner since we perform everything it does plus more.  How do you know if iTecs maintains your system?  Look for our company logo in your taskbar, if you see the red triangle your system is updated and maintained daily.

iTecs Remote Monitoring and Management

Latest Posts

February 3, 2022

The Rise of SMS Phishing

After what seems like a lifetime of technology exposure, I still become saddened but not surprised when I hear about someone falling victim to a phishing attack. Most medium to large businesses, if not all, have invested heavily in employee awareness training as a means to improve their cybersecurity posture.

Read More
December 17, 2021

iTecs Enters Into A Partnership With Check Point

iTecs enters into a partnership with Check Point, a leader in enterprise and SMB cybersecurity products and solutions, to provide iTecs clients with efficacious cybersecurity protection. The collaboration between the two parties enables iTecs to deliver the various services and products to clients as a managed service.

Read More
September 8, 2021

How To Protect Crypto Exchange Accounts

Mitigate the chances that your crypto exchange accounts get hacked by following the tips below.‍You may have read articles of families losing their entire online Exchange accounts balances due to hackers breaching and stealing everything they own. Some of you may believe that the responsibility of these hacks is on the Exchanges, and I'm here to tell you this is usually not the case. Before you get angry, let me first explain the two types of hacks that occur that lead to you losing your entire investment.

Read More

You have questions, we have answers

What can we help you with?