Piriform Software

Last updated
Piriform Software Ltd
Type Subsidiary
Industry Computer software
Founded15 September 2005;17 years ago (2005-09-15)
Founders
  • Guy Saner
  • Lindsey Whelan
Headquarters,
England
Products CCleaner
Recuva
Defraggler
Speccy
CCleaner Cloud [1]
CCleaner Browser
Owner Gen Digital
Parent Avast

Piriform Software Ltd is a British software company based in London, owned since 2017 by Avast which itself became part of NortonLifeLock (now Gen Digital) in 2022. The company develops cleaning and optimisation tools for Microsoft Windows, macOS and Android operating systems, including CCleaner, CCleaner Browser, Defraggler, Recuva and Speccy. [2] [3] On 22 September 2015, Piriform launched CCleaner Cloud, a tool to maintain computers remotely. [4]

Contents

History

The name Piriform means "shaped like a pear," possibly referring to the British slang "to go pear-shaped".[ citation needed ]

CCleaner was launched in 2004 by founders Guy Saner and Lindsey Whelan.

In July 2017, Piriform Ltd was acquired by Avast. [5] [6]

In September 2017, researchers discovered that CCleaner was compromised by hackers who inserted a backdoor into the software, enabling remote access to infected machines. [7] [5] [8]

The malware was in version 5.33 of CCleaner, prior to the acquisition by Avast. Avast quickly fixed the vulnerability and required version 5.33 users to update immediately. [9]

CCleaner

CCleaner is a computer cleaning software featuring MacOS and Windows versions. CCleaner has the option to clean computer browser software including Microsoft Edge, Internet Explorer, Google Chrome, and Firefox as well as a computer system's temporary files. It has a separate tab to clean the registry. (A potential backup of regedit is available.) CCleaner's other tools include editing and uninstalling programs, editing the operating system's startup apps and editing browser plugins. It can analyse hard disks individually to determine which files are taking the most space. It can search for duplicate files to help reduce drive storage space. It allows one to quickly access system restore points, and it can wipe clean the free space on individual drives to completely remove deleted files. In addition, CCleaner can automatically update computer software and drivers.

CCleaner has its own web browser called CCleaner Browser. CCleaner Browser is included to optionally install in the CCleaner installer, but it can also be installed from its website. CCleaner Browser blocks online advertisements, avoids tracking, has built-in security against malware, phishing, malicious downloads, and also avoids potentially unwanted elements like pop-ups or excessive browser cache. The browser is only available for Microsoft Windows. [10]

CCleaner also develops a tool called Kamo, which feeds trackers fake information to help stop a 'digital fingerprint' (a unique fingerprint that can be used to identify and track people) from being created. It supposedly makes websites and advertisers less able to show targeted ads, recommendations and price increases.[ citation needed ]

Related Research Articles

<span class="mw-page-title-main">Malware</span> Malicious software

Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types.

<span class="mw-page-title-main">Rootkit</span> Software designed to enable access to unauthorized locations in a computer

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software. The term rootkit is a compound of "root" and the word "kit". The term "rootkit" has negative connotations through its association with malware.

<span class="mw-page-title-main">Antivirus software</span> Computer software to defend against malicious computer viruses

Antivirus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

<span class="mw-page-title-main">Avast</span> Czech security software company

Avast Software s.r.o. is a Czech multinational cybersecurity software company headquartered in Prague, Czech Republic that researches and develops computer security software, machine learning and artificial intelligence. Avast has more than 435 million monthly active users and the second largest market share among anti-malware application vendors worldwide as of April 2020. The company has approximately 1,700 employees across its 25 offices worldwide. In July 2021, NortonLifeLock, an American cybersecurity company, announced that it is in talks to merge with Avast Software. In August 2021, Avast's board of directors agreed to an offer of US$8 billion.

Remote administration refers to any method of controlling a computer from a remote location. Software that allows remote administration is becoming increasingly common and is often used when it is difficult or impractical to be physically near a system in order to use it. A remote location may refer to a computer in the next room or one on the other side of the world. It may also refer to both legal and illegal remote administration.

<span class="mw-page-title-main">System Restore</span> System recovery feature in Microsoft Windows

System Restore is a feature in Microsoft Windows that allows the user to revert their computer's state to that of a previous point in time, which can be used to recover from system malfunctions or other problems. First included in Windows Me, it has been included in all following desktop versions of Windows released since, excluding Windows Server. In Windows 10, System Restore is turned off by default and must be enabled by users in order to function. This does not affect personal files such as documents, music, pictures, and videos.

A registry cleaner is a class of third-party utility software designed for the Microsoft Windows operating system, whose purpose is to remove redundant items from the Windows Registry.

<span class="mw-page-title-main">WinFixer</span> Rogue security software

WinFixer was a family of scareware rogue security programs developed by Winsoftware which claimed to repair computer system problems on Microsoft Windows computers if a user purchased the full version of the software. The software was mainly installed without the user's consent. McAfee claimed that "the primary function of the free version appears to be to alarm the user into paying for registration, at least partially based on false or erroneous detections." The program prompted the user to purchase a paid copy of the program.

Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware. Eventually, some member of the targeted group will become infected. Hacks looking for specific information may only attack users coming from a specific IP address. This also makes the hacks harder to detect and research. The name is derived from predators in the natural world, who wait for an opportunity to attack their prey near watering holes.

Cain and Abel was a password recovery tool for Microsoft Windows. It could recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks. Cryptanalysis attacks were done via rainbow tables which could be generated with the winrtgen.exe program provided with Cain and Abel. Cain and Abel was maintained by Massimiliano Montoro and Sean Babcock.

<span class="mw-page-title-main">CCleaner</span> Suite of utilities for cleaning disk and operating system environment

CCleaner, developed by Piriform Software, is a utility used to clean potentially unwanted files and invalid Windows Registry entries from a computer. It is one of the longest-established system cleaners, first launched in 2004. It was originally developed for Microsoft Windows only, but in 2012, a macOS version was released. An Android version was released in 2014.

<span class="mw-page-title-main">Recuva</span> Undeletion program for Windows

Recuva is an undeletion program for Windows, developed by Piriform Software. It is able to undelete files that have been marked as deleted; the operating system marks the areas of the disk in which they were stored as free space. Recuva can recover files deleted from internal and external hard disk drives, USB flash drives, memory cards, portable media players or all random-access storage mediums with a supported file system. Preview thumbnails of intact photos can be displayed in grid view mode and in the side bar.

<span class="mw-page-title-main">Defraggler</span>

Defraggler is a freemium defragmentation utility developed by Piriform Software, which can defragment individual files or groups of files on computer memory systems. Defraggler runs on Microsoft Windows; it has support for all versions since Windows XP. It includes support for both IA-32 and x64 versions of these operating systems.

<span class="mw-page-title-main">VirusTotal</span> Cybersecurity website owned by Chronicle

VirusTotal is a website created by the Spanish security company Hispasec Sistemas. Launched in June 2004, it was acquired by Google in September 2012. The company's ownership switched in January 2018 to Chronicle, a subsidiary of Google.

<span class="mw-page-title-main">AVG Technologies</span> Brand of cybersecurity, privacy, performance and utility applications

AVG Technologies is a brand of cybersecurity, privacy, performance and utility software applications for desktop computers and mobile devices developed by Avast, a part of Gen Digital. AVG was a cybersecurity software company founded in 1991 and it merged into Avast following an acquisition in 2017. It typically offers freeware, earning revenues from advertisers and from users that upgrade to paid versions for access to more features.

<span class="mw-page-title-main">Computer virus</span> Computer program that modifies other programs to replicate itself and spread

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.

Cyber spying, cyber espionage, or cyber-collection is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks or individual computers through the use of proxy servers, cracking techniques and malicious software including Trojan horses and spyware. It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers.

Browser security is the application of Internet security to web browsers in order to protect networked data and computer systems from breaches of privacy or malware. Security exploits of browsers often use JavaScript, sometimes with cross-site scripting (XSS) with a secondary payload using Adobe Flash. Security exploits can also take advantage of vulnerabilities that are commonly exploited in all browsers.

<span class="mw-page-title-main">Avast Secure Browser</span> Chromium-based browser made by Avast

Avast Secure Browser is an Avast Software web browser included for optional installation in the Avast Antivirus installer since 2016, but it is also available on its website. It is based on the open source Chromium project. It is available for Microsoft Windows, macOS, iOS, and Android.

<span class="mw-page-title-main">Vault 7</span> CIA files on cyber war and surveillance

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare. The files, dating from 2013 to 2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs, web browsers, and the operating systems of most smartphones, as well as other operating systems such as Microsoft Windows, macOS, and Linux. A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release. The tools were developed by the Operations Support Branch of the C.I.A.

References

  1. "Piriform Blog - CCleaner Cloud has Launched!". Piriform. 22 September 2015. Archived from the original on 12 April 2016. Retrieved 22 September 2015.
  2. "Piriform Product page". Piriform. Retrieved 10 November 2007.
  3. "Piriform company Info page". Piriform. Retrieved 10 November 2007.
  4. "A first look at CCleaner Cloud - gHacks Tech News". gHacks.net. 25 September 2015. Retrieved 6 October 2017.
  5. 1 2 "Hackers compromised free CCleaner software, Avast's Piriform says". 18 September 2017. Retrieved 6 October 2017 via Reuters.
  6. Sawers, Paul (19 July 2017). "Avast acquires Piriform, maker of popular system cleaning program CCleaner". VentureBeat . Retrieved 19 July 2017.
  7. "CCleanup: A Vast Number of Machines at Risk". blog.TalosIntelligence.com. September 2017. Retrieved 6 October 2017.
  8. "Avast urges devs to secure toolchains after hacked build box led to CCleaner disaster," JohnLeyden, The Register, 6 Oct 2017
  9. "CCleaner Malware". www.kaspersky.com. 2021-01-13. Retrieved 2021-09-29.
  10. "What is CCleaner Browser?". Piriform Support. Retrieved 2021-10-10.