

How do I remove the Floxif or CCleaner Malware? The malware could also download and execute other malware, but Avast said it did not find evidence that attackers ever used this function. The malware - named Floxif - collects data from infected computers, such as computer name, a list of installed software, a list of running processes, MAC addresses for the first three network interfaces, and unique IDs to identify each computer in part. It will only replace the malicious executables with legitimate ones so that the malware is no longer present. as seen below, upgrading to version 5.34 will not remove the Agomo key from the Windows registry. If it does, then you are infected with this malware. You can use Registry Editor to navigate to the Agomo key and see if it exists. Under this key will be two data values named MUID and TCID, which are used by the installed Floxif infection. When an infected version of CCleaner was installed it would have created a Windows Registry key located at HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\Agomo. The files were available for download between August 15 and September 12.Įverybody who downloaded and installed the affected versions in that timespan.Īvast estimates the number of affected machines at 2.27 million. The attacker added malware to the CCleaner and CCleaner Cloud installers, but the malware only executed on 32-bit systems and when run by a user with admin rights. For a full recap of what happened, you can read our complete CCleaner coverage.Īn unknown threat group compromised the CCleaner infrastructure. The program is not updated automatically.This is a small guide and FAQ on the malware installed alongside CCleaner. That malware was spread through infected Ukrainian accounting software.ĬCleaner makes use of a digital certificate which allows computers to automatically trust the program during installation. Piriform recommends users of CCleaner version and CCleaner Cloud version to download new versions of the software.


Reuters reports that researcher Craig Williams states that the malware spreads in a similar manner to the NotPetya attack in June. The infected version of CCleaner could be downloaded in August, the exploit services tried to connect to several unregistered websites, possibly to download more malware. According to researchers, the program is downloaded five million times a week for PCs and Android phones.

CCleaner is free software that can improve the performance of a computer. Talos, a branch of security company Cisco made the discovery, hackers have been able to inject malware as they hacked into the British company Piriform, who develops CCleaner. With millions of downloads last month the end-users may have been infected. A bit of a warning, if you have download CCleaner recently, their installer was infected with malicious software.
