
Two-factor authentication (aka two-step verification) was not required to log into the VPN, so the hackers were able to get inside the network using the stolen credentials. The investigators found that the hackers accessed the company’s network by stealing an employee’s virtual private network (VPN) credentials for a temporary VPN profile that was mistakenly left active. On September 23, 2019, the company noticed suspicious behavior in its network, so it started an investigation. To provide transparency and to let others learn from its experiences, Avast shared what happened in the 2019 attack. This time, though, the intrusion was detected and thwarted before hackers could insert any code.
#CCLEANER BREACH CODE#
In September 2019, Avast discovered that cybercriminals once again breached company servers in an attempt to insert malicious code into CCleaner. Avast cleaned up the mess, but not without taking a serious hit to its reputation given that it is a cybersecurity firm.

Neither the breach nor the backdoor was discovered at that time, so two versions of the utility (the 32-bit and cloud versions) were released with the malware in it. In 2017, when Avast was in the process of acquiring CCleaner’s developer, Piriform, cybercriminals breached Piriform servers and inserted a backdoor into the app during the build process. Here are several lessons that you can learn from these attacks.ĬCleaner - a popular app designed to clean up unused data, unnecessary settings, and other leftovers that can make computers run slower - was the target of hackers once again. CCleaner has been the target of hackers twice in the last three years.
