
We strongly suspect that Piriform was being targeted while they were operating as a standalone company, prior to the Avast acquisition. The server was provisioned earlier in 2017 and the SSL certificate for the respective https communication had a timestamp of July 3, 2017.

The compromise may have started on July 3 rd. What we didn’t know was that before we completed the acquisition, the bad actors were likely already in the process of hacking into the Piriform systems. The purpose of this article is to clarify what actually happened, correct some misleading information that is currently circulating, recap what actions Avast took, and outline next steps.Īvast acquired Piriform, the maker of CCleaner, on Jbecause Piriform has a great product, and wonderful supporters and users. Within approximately 72 hours of discovery, the issue was resolved by Avast with no known harm to our Piriform customers. As such, as soon as we became aware of this issue, we engaged and solved it. We understand that given the late disclosure of the massive Equifax data breach 10 days ago, consumers and media are very sensitive, as they should be. Our first priority is our commitment to the safety and security of our millions of users, and supporting our new partner Piriform as they manage this situation.

There has been quite a bit of press coverage today about our announcement that the Piriform CCleaner product was illegally modified during the build process to include a backdoor component. Clarifying what happened and outlining our next steps in protecting CCleaner customers
