Piriform (company)

Last updated
Piriform Ltd
Type Subsidiary
Industry Computer software
Founded15 September 2005;17 years ago (2005-09-15)
FoundersGuy Saner and Lindsey Whelan
Products CCleaner
Recuva
Defraggler
Speccy
CCleaner Cloud [1]
CCleaner Browser
Parent Avast (Gen Digital)
Website https://www.ccleaner.com/

Piriform Ltd is a British software company based in London, owned since 2017 by Avast which itself become part of NortonLifeLock (later rebranded as Gen Digital) in 2022. The company develops cleaning and optimisation tools for Microsoft Windows, macOS and Android operating systems, including CCleaner, CCleaner Browser, Defraggler, Recuva and Speccy. [2] [3] On 22 September 2015, Piriform launched CCleaner Cloud, a tool to maintain computers remotely. [4]

Contents

History

The name Piriform means "shaped like a pear," possibly referring to the British slang "to go pear-shaped".[ citation needed ]

CCleaner was launched in 2004 by founders Guy Saner and Lindsey Whelan.

In July 2017, Piriform Ltd was acquired by Avast. [5] [6]

In September 2017, researchers discovered that CCleaner was compromised by hackers who inserted a backdoor into the software, enabling remote access to infected machines. [7] [5] [8]

The malware was in version 5.33 of CCleaner, prior to the acquisition by Avast. Avast quickly fixed the vulnerability and required version 5.33 users to update immediately. [9]

CCleaner

CCleaner is a computer cleaning software featuring MacOS and Windows versions. CCleaner has the option to clean computer browser software including Microsoft Edge, Internet Explorer, Google Chrome, and Firefox as well as a computer system's temporary files. It has a separate tab to clean the registry. (A potential backup of regedit is available.) CCleaner's other tools include editing and uninstalling programs, editing the operating system's startup apps and editing browser plugins. It can analyse hard disks individually to determine which files are taking the most space. It can search for duplicate files to help reduce drive storage space. It allows one to quickly access system restore points, and it can wipe clean the free space on individual drives to completely remove deleted files. In addition, CCleaner can automatically update computer software and drivers.

CCleaner has its own web browser called CCleaner Browser. CCleaner Browser is included to optionally install in the CCleaner installer, but it can also be installed from its website. CCleaner Browser blocks online advertisements, avoids tracking, has built-in security against malware, phishing, malicious downloads, and also avoids unwanted elements like pop-ups or excessive browser cache. The browser is only available for Microsoft Windows. [10]

CCleaner also develops a tool called Kamo, which feeds trackers fake information to help stop a 'digital fingerprint' (a unique fingerprint that can be used to identify and track people) from being created. It supposedly makes websites and advertisers less able to show targeted ads, recommendations and price increases.[ citation needed ]

Related Research Articles

<span class="mw-page-title-main">Malware</span> Malicious software

Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. By contrast, software that causes harm due to some deficiency is typically described as a software bug. Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year.

<span class="mw-page-title-main">Rootkit</span> Software designed to enable access to unauthorized locations in a computer

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software. The term rootkit is a compound of "root" and the word "kit". The term "rootkit" has negative connotations through its association with malware.

<span class="mw-page-title-main">Antivirus software</span> Computer software to defend against malicious computer viruses

Antivirus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

<span class="mw-page-title-main">Avast</span> Czech security software company

Avast Software s.r.o. is a Czech multinational cybersecurity software company headquartered in Prague, Czech Republic that researches and develops computer security software, machine learning and artificial intelligence. Avast has more than 435 million monthly active users and the second largest market share among anti-malware application vendors worldwide as of April 2020. The company has approximately 1,700 employees across its 25 offices worldwide. In July 2021, NortonLifeLock, an American cybersecurity company, announced that it is in talks to merge with Avast Software. In August 2021, Avast's board of directors agreed to an offer of US$8 billion.

Remote administration refers to any method of controlling a computer from a remote location. Software that allows remote administration is becoming increasingly common and is often used when it is difficult or impractical to be physically near a system in order to use it. A remote location may refer to a computer in the next room or one on the other side of the world. It may also refer to both legal and illegal remote administration.

A registry cleaner is a class of third-party utility software designed for the Microsoft Windows operating system, whose purpose is to remove redundant items from the Windows Registry.

Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware. Eventually, some member of the targeted group will become infected. Hacks looking for specific information may only attack users coming from a specific IP address. This also makes the hacks harder to detect and research. The name is derived from predators in the natural world, who wait for an opportunity to attack their prey near watering holes.

Cain and Abel was a password recovery tool for Microsoft Windows. It could recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks. Cryptanalysis attacks were done via rainbow tables which could be generated with the winrtgen.exe program provided with Cain and Abel. Cain and Abel was maintained by Massimiliano Montoro and Sean Babcock.

<span class="mw-page-title-main">CCleaner</span> Suite of utilities for cleaning disk and operating system environment

CCleaner, developed by Piriform, is a utility used to clean potentially unwanted files and invalid Windows Registry entries from a computer. It is one of the longest-established system cleaners, first launched in 2004. It was originally developed for Microsoft Windows only, but in 2012, a macOS version was released. An Android version was released in 2014.

<span class="mw-page-title-main">Defraggler</span>

Defraggler is a freemium defragmentation utility developed by Piriform, which can defragment individual files or groups of files on computer system. Defraggler runs on Microsoft Windows; it has support for all versions since Windows XP. It includes support for both IA-32 and x64 versions of these operating systems.

<span class="mw-page-title-main">VirusTotal</span> Cybersecurity website owned by Chronicle

VirusTotal is a website created by the Spanish security company Hispasec Sistemas. Launched in June 2004, it was acquired by Google in September 2012. The company's ownership switched in January 2018 to Chronicle, a subsidiary of Google.

<span class="mw-page-title-main">AVG Technologies</span> Brand by Avast

AVG Technologies is a brand of cybersecurity, privacy, performance and utility software applications for desktop computers and mobile devices developed by Avast. AVG was a cybersecurity software company founded in 1991 and it merged into Avast following an acquisition in 2017. It typically offers freeware, earning revenues from advertisers and from users that upgrade to paid versions for access to more features.

Turbo is a set of software products and services developed by the Code Systems Corporation for application virtualization, portable application creation, and digital distribution. Code Systems Corporation is an American corporation headquartered in Seattle, Washington, and is best known for its Turbo products that include Browser Sandbox, Turbo Studio, TurboServer, and Turbo.

<span class="mw-page-title-main">Computer virus</span> Computer program that modifies other programs to replicate itself and spread

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.

Trusteer is a Boston-based computer security division of IBM, responsible for a suite of security software. Founded by Mickey Boodaei and Rakesh K. Loonkar, in Israel in 2006, Trusteer was acquired in September 2013 by IBM for $1 billion.

<span class="mw-page-title-main">Mobile security</span> Security risk and prevention for mobile devices

Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern.

<span class="mw-page-title-main">Avast Antivirus</span> Antivirus computer program

Avast Antivirus is a family of cross-platform internet security applications developed by Avast for Microsoft Windows, macOS, Android and iOS. The Avast Antivirus products include freeware and paid versions that provide computer security, browser security, antivirus software, firewall, anti-phishing, antispyware, and anti-spam among other services.

Browser security is the application of Internet security to web browsers in order to protect networked data and computer systems from breaches of privacy or malware. Security exploits of browsers often use JavaScript, sometimes with cross-site scripting (XSS) with a secondary payload using Adobe Flash. Security exploits can also take advantage of vulnerabilities that are commonly exploited in all browsers.

<span class="mw-page-title-main">Avast Secure Browser</span> Chromium-based browser made by Avast

Avast Secure Browser is an Avast Software web browser included for optional installation in the Avast Antivirus installer since 2016, but it is also available on its website. It is based on the open source Chromium project. It is available for Microsoft Windows, macOS, iOS, and Android.

<span class="mw-page-title-main">Vault 7</span> CIA files to perform electronic surveillance and cyber warfare.

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency to perform electronic surveillance and cyber warfare. The files, dating from 2013 to 2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs, web browsers, and the operating systems of most smartphones, as well as other operating systems such as Microsoft Windows, macOS, and Linux. A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release. The tools were developed by the Operations Support Branch of the C.I.A.

References

  1. "Piriform Blog - CCleaner Cloud has Launched!". Piriform. 22 September 2015. Archived from the original on 12 April 2016. Retrieved 22 September 2015.
  2. "Piriform Product page". Piriform. Retrieved 10 November 2007.
  3. "Piriform company Info page". Piriform. Retrieved 10 November 2007.
  4. "A first look at CCleaner Cloud - gHacks Tech News". gHacks.net. 25 September 2015. Retrieved 6 October 2017.
  5. 1 2 "Hackers compromised free CCleaner software, Avast's Piriform says". 18 September 2017. Retrieved 6 October 2017 via Reuters.
  6. Sawers, Paul (19 July 2017). "Avast acquires Piriform, maker of popular system cleaning program CCleaner". VentureBeat . Retrieved 19 July 2017.
  7. "CCleanup: A Vast Number of Machines at Risk". blog.TalosIntelligence.com. September 2017. Retrieved 6 October 2017.
  8. "Avast urges devs to secure toolchains after hacked build box led to CCleaner disaster," JohnLeyden, The Register, 6 Oct 2017
  9. "CCleaner Malware". www.kaspersky.com. 2021-01-13. Retrieved 2021-09-29.
  10. "What is CCleaner Browser?". Piriform Support. Retrieved 2021-10-10.