Piriform Software

Last updated
Piriform Software Ltd
Company type Subsidiary
Industry Computer software
Founded15 September 2005;18 years ago (2005-09-15)
Founders
  • Guy Saner
  • Lindsey Whelan
Headquarters,
England
Products CCleaner
Recuva
Defraggler
Speccy
CCleaner Cloud [1]
CCleaner Browser
Owner Gen Digital
Parent Avast

Piriform Software Ltd is a British software company based in London, owned since 2017 by Avast which itself became part of NortonLifeLock (now Gen Digital) in 2022. The company develops cleaning and optimisation tools for Microsoft Windows, macOS and Android operating systems, including CCleaner, CCleaner Browser, Defraggler, Recuva and Speccy. [2] [3] On 22 September 2015, Piriform launched CCleaner Cloud, a tool to maintain computers remotely. [4]

Contents

History

The name Piriform means "shaped like a pear," possibly referring to the British slang "to go pear-shaped".[ citation needed ]

CCleaner was launched in 2004 by founders Guy Saner and Lindsey Whelan. In July 2017, Piriform Ltd was acquired by Avast. [5] [6]

In September 2017, researchers discovered that CCleaner was compromised by hackers who inserted a backdoor into the software, enabling remote access to infected machines. [7] [5] [8] The malware was in version 5.33 of CCleaner, prior to the acquisition by Avast. Avast quickly fixed the vulnerability and required version 5.33 users to update immediately. [9]

CCleaner

CCleaner is a computer cleaning software featuring MacOS and Windows versions. CCleaner has the option to clean computer browser software including Microsoft Edge, Internet Explorer, Google Chrome, and Firefox as well as a computer system's temporary files. It has a separate tab to clean the registry. (A potential backup of regedit is available.) CCleaner's other tools include editing and uninstalling programs, editing the operating system's startup apps and editing browser plugins. It can analyse hard disks individually to determine which files are taking the most space. It can search for duplicate files to help reduce drive storage space. It allows one to quickly access system restore points, and it can wipe clean the free space on individual drives to completely remove deleted files. In addition, CCleaner can automatically update computer software and drivers.

CCleaner has its own web browser called CCleaner Browser. CCleaner Browser is included to optionally install in the CCleaner installer, but it can also be installed from its website. CCleaner Browser blocks online advertisements, avoids tracking, has built-in security against malware, phishing, malicious downloads, and also avoids potentially unwanted elements like pop-ups or excessive browser cache. The browser is only available for Microsoft Windows. [10]

CCleaner also develops a tool called Kamo, which feeds trackers fake information to help stop a 'digital fingerprint' (a unique fingerprint that can be used to identify and track people) from being created. It supposedly makes websites and advertisers less able to show targeted ads, recommendations and price increases.[ citation needed ]

Related Research Articles

Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types.

Spyware is any software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's security, or other means. This behavior may be present in malware and in legitimate software. Websites may engage in spyware behaviors like web tracking. Hardware devices may also be affected.

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software. The term rootkit is a compound of "root" and the word "kit". The term "rootkit" has negative connotations through its association with malware.

<span class="mw-page-title-main">Antivirus software</span> Computer software to defend against malicious computer viruses

Antivirus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

<span class="mw-page-title-main">Avast</span> Czech security software company

Avast Software s.r.o. is a Czech multinational cybersecurity software company headquartered in Prague, Czech Republic, that researches and develops computer security software, machine learning, and artificial intelligence. Avast has more than 435 million monthly active users and the second largest market share among anti-malware application vendors worldwide as of April 2020. The company has approximately 1,700 employees across its 25 offices worldwide. In July 2021, NortonLifeLock, an American cybersecurity company, announced that it was in talks to merge with Avast Software. In August 2021, Avast's board of directors agreed to an offer of US$8 billion.

<span class="mw-page-title-main">System Restore</span> System recovery feature in Microsoft Windows

System Restore is a feature in Microsoft Windows that allows the user to revert their computer's state to that of a previous point in time, which can be used to recover from system malfunctions or other problems. First included in Windows Me, it has been included in all following desktop versions of Windows released since, excluding Windows Server. In Windows 10, System Restore is turned off by default and must be enabled by users in order to function. This does not affect personal files such as documents, music, pictures, and videos.

A registry cleaner is a class of third-party utility software designed for the Microsoft Windows operating system, whose purpose is to remove redundant items from the Windows Registry.

Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware. Eventually, some member of the targeted group will become infected. Hacks looking for specific information may only attack users coming from a specific IP address. This also makes the hacks harder to detect and research. The name is derived from predators in the natural world, who wait for an opportunity to attack their prey near watering holes.

Cain and Abel was a password recovery tool for Microsoft Windows. It could recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks. Cryptanalysis attacks were done via rainbow tables which could be generated with the winrtgen.exe program provided with Cain and Abel. Cain and Abel was maintained by Massimiliano Montoro and Sean Babcock.

<span class="mw-page-title-main">CCleaner</span> Suite of utilities for cleaning disk and operating system environment

CCleaner, developed by Piriform Software, is a utility used to clean potentially unwanted files and invalid Windows Registry entries from a computer. It is one of the longest-established system cleaners, first launched in 2004. It was originally developed for Microsoft Windows only, but in 2012, a macOS version was released. An Android version was released in 2014.

<span class="mw-page-title-main">Defraggler</span> Defragmentation utility for Windows

Defraggler is a freemium defragmentation utility developed by Piriform Software, which can defragment individual files or groups of files on computer memory systems. Defraggler runs on Microsoft Windows; it has support for all versions since Windows XP. It includes support for both IA-32 and x64 versions of these operating systems.

<span class="mw-page-title-main">VirusTotal</span> Cybersecurity website owned by Chronicle

VirusTotal is a website created by the Spanish security company Hispasec Sistemas. Launched in June 2004, it was acquired by Google in September 2012. The company's ownership switched in January 2018 to Chronicle, a subsidiary of Google.

<span class="mw-page-title-main">AVG Technologies</span> Brand of cybersecurity, privacy, performance and utility applications

AVG Technologies is a brand of cybersecurity, privacy, performance and utility software applications for desktop computers and mobile devices developed by Avast, a part of Gen Digital. AVG was a cybersecurity software company founded in 1991 and it merged into Avast following an acquisition in 2017. It typically offers freeware, earning revenues from advertisers and from users that upgrade to paid versions for access to more features.

Turbo is a set of software products and services developed by the Code Systems Corporation for application virtualization, portable application creation, and digital distribution. Code Systems Corporation is an American corporation headquartered in Seattle, Washington, and is best known for its Turbo products that include Browser Sandbox, Turbo Studio, TurboServer, and Turbo.

<span class="mw-page-title-main">Computer virus</span> Computer program that modifies other programs to replicate itself and spread

A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.

Trusteer is a Boston-based computer security division of IBM, responsible for a suite of security software. Founded by Mickey Boodaei and Rakesh K. Loonkar, in Israel in 2006, Trusteer was acquired in September 2013 by IBM for $1 billion.

Avira Operations GmbH & Co. KG is a German multinational computer security software company mainly known for its Avira Free Security antivirus software. Although founded in 2006, the Avira antivirus application has been under active development since 1986 through its predecessor company H+BEDV Datentechnik GmbH. Since 2021, Avira has been owned by American software company NortonLifeLock, which also operates Norton, Avast and AVG. It was previously owned by investment firm Investcorp.

Browser security is the application of Internet security to web browsers in order to protect networked data and computer systems from breaches of privacy or malware. Security exploits of browsers often use JavaScript, sometimes with cross-site scripting (XSS) with a secondary payload using Adobe Flash. Security exploits can also take advantage of vulnerabilities that are commonly exploited in all browsers.

<span class="mw-page-title-main">Avast Secure Browser</span> Chromium-based browser made by Avast

Avast Secure Browser is an Avast Software web browser included for optional installation in the Avast Antivirus installer since 2016, but it is also available on its website. It is based on the open source Chromium project. It is available for Microsoft Windows, macOS, iOS, and Android.

<span class="mw-page-title-main">Vault 7</span> CIA files on cyber war and surveillance

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare. The files, dating from 2013 to 2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs, web browsers including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera, the operating systems of most smartphones including Apple's iOS and Google's Android, and computer operating systems including Microsoft Windows, macOS, and Linux. A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release. The tools were developed by the Operations Support Branch of the CIA.

References

  1. "Piriform Blog - CCleaner Cloud has Launched!". Piriform. 22 September 2015. Archived from the original on 12 April 2016. Retrieved 22 September 2015.
  2. "Piriform Product page". Piriform. Retrieved 10 November 2007.
  3. "Piriform company Info page". Piriform. Retrieved 10 November 2007.
  4. "A first look at CCleaner Cloud - gHacks Tech News". gHacks.net. 25 September 2015. Retrieved 6 October 2017.
  5. 1 2 "Hackers compromised free CCleaner software, Avast's Piriform says". Reuters.com. 18 September 2017. Retrieved 6 October 2017.
  6. Sawers, Paul (19 July 2017). "Avast acquires Piriform, maker of popular system cleaning program CCleaner". VentureBeat.com. Retrieved 19 July 2017.
  7. "CCleanup: A Vast Number of Machines at Risk". blog.TalosIntelligence.com. September 2017. Retrieved 6 October 2017.
  8. Leyden, John (6 October 2017). "Avast urges devs to secure toolchains after hacked build box led to CCleaner disaster". The Register.
  9. "CCleaner Malware". kaspersky.com. 2021-01-13. Retrieved 2021-09-29.
  10. "What is CCleaner Browser?". Piriform Support. Retrieved 2021-10-10.