Piriform Software

Last updated
Piriform Software Ltd
Company type Subsidiary
Industry Computer software
Founded15 September 2005;18 years ago (2005-09-15)
Founders
  • Guy Saner
  • Lindsey Whelan
Headquarters,
England
Products CCleaner
Recuva
Defraggler
Speccy
CCleaner Cloud [1]
CCleaner Browser
Owner Gen Digital
Parent Avast

Piriform Software Ltd is a British software company based in London, owned since 2017 by Avast which itself became part of NortonLifeLock (now Gen Digital) in 2022. The company develops cleaning and optimisation tools for Microsoft Windows, macOS and Android operating systems, including CCleaner, CCleaner Browser, Defraggler, Recuva and Speccy. [2] [3] On 22 September 2015, Piriform launched CCleaner Cloud, a tool to maintain computers remotely. [4]

Contents

History

Piriform Software was founded in 2004 by Guy Saner and Lindsey Whelan, who were later joined by Richard Stallman in 2005.

Their breakthrough came with the release of CCleaner in 2004, in July 2017, Piriform Ltd was acquired by Avast. [5] [6]

In September 2017, researchers discovered that CCleaner was compromised by hackers who inserted a backdoor into the software, enabling remote access to infected machines. [7] [5] [8] The malware was in version 5.33 of CCleaner, prior to the acquisition by Avast. Avast quickly fixed the vulnerability and required version 5.33 users to update immediately. [9]

CCleaner

CCleaner is a computer cleaning software featuring MacOS and Windows versions. CCleaner has the option to clean computer browser software including Microsoft Edge, Internet Explorer, Google Chrome, and Firefox as well as a computer system's temporary files. It has a separate tab to clean the registry. (A potential backup of regedit is available.) CCleaner's other tools include editing and uninstalling programs, editing the operating system's startup apps and editing browser plugins. It can analyse hard disks individually to determine which files are taking the most space. It can search for duplicate files to help reduce drive storage space. It allows one to quickly access system restore points, and it can wipe clean the free space on individual drives to completely remove deleted files. In addition, CCleaner can automatically update computer software and drivers.

CCleaner has its own web browser called CCleaner Browser. CCleaner Browser is included to optionally install in the CCleaner installer, but it can also be installed from its website. CCleaner Browser blocks online advertisements, avoids tracking, has built-in security against malware, phishing, malicious downloads, and also avoids potentially unwanted elements like pop-ups or excessive browser cache. The browser is only available for Microsoft Windows. [10]

CCleaner also develops a tool called Kamo, which feeds trackers fake information to help stop a 'digital fingerprint' (a unique fingerprint that can be used to identify and track people) from being created. It supposedly makes websites and advertisers less able to show targeted ads, recommendations and price increases.[ citation needed ]

Related Research Articles

Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types.

Spyware is any software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's security, or other means. This behavior may be present in malware and in legitimate software. Websites may engage in spyware behaviors like web tracking. Hardware devices may also be affected.

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software. The term rootkit is a compound of "root" and the word "kit". The term "rootkit" has negative connotations through its association with malware.

<span class="mw-page-title-main">Antivirus software</span> Computer software to defend against malicious computer viruses

Antivirus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

A patch is a set of changes to a computer program or its supporting data designed to update or repair it. This includes bugfixes or bug fixes to remove security vulnerabilities and correct bugs (errors). Patches are often written to improve the functionality, usability, or performance of a program. The majority of patches are provided by software vendors for operating system and application updates.

Installation of a computer program, is the act of making the program ready for execution. Installation refers to the particular configuration of software or hardware with a view to making it usable with the computer. A soft or digital copy of the piece of software (program) is needed to install it. There are different processes of installing a piece of software (program). Because the process varies for each program and each computer, programs often come with an installer, a specialised program responsible for doing whatever is needed for the installation. Installation may be part of a larger software deployment process.

<span class="mw-page-title-main">Avast</span> Czech security software company

Avast Software s.r.o. is a Czech multinational cybersecurity software company headquartered in Prague, Czech Republic, that researches and develops computer security software, machine learning, and artificial intelligence. Avast has more than 435 million monthly active users and the second largest market share among anti-malware application vendors worldwide as of April 2020. The company has approximately 1,700 employees across its 25 offices worldwide. In July 2021, NortonLifeLock, an American cybersecurity company, announced that it was in talks to merge with Avast Software. In August 2021, Avast's board of directors agreed to an offer of US$8 billion.

<span class="mw-page-title-main">Microsoft Defender Antivirus</span> Anti-malware software

Microsoft Defender Antivirus is an antivirus software component of Microsoft Windows. It was first released as a downloadable free anti-spyware program for Windows XP and was shipped with Windows Vista and Windows 7. It has evolved into a full antivirus program, replacing Microsoft Security Essentials in Windows 8 or later versions.

Remote administration refers to any method of controlling a computer or other Internet-connected device, such as a smartphone, from a remote location. There are many commercially available and free-to-use software that make remote administration easy to set up and use. Remote administration is often used when it's difficult or impractical to be physically near a system in order to use it or troubleshoot it. Many server administrators also use remote administration to control the servers around the world at remote locations. It is also used by companies and corporations to improve overall productivity as well as promote remote work. It may also refer to both legal and illegal remote administration.

Watering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware. Eventually, some member of the targeted group will become infected. Hacks looking for specific information may only attack users coming from a specific IP address. This also makes the hacks harder to detect and research. The name is derived from predators in the natural world, who wait for an opportunity to attack their prey near watering holes.

<span class="mw-page-title-main">CCleaner</span> Suite of utilities for cleaning disk and operating system environment

CCleaner, developed by Piriform Software, is a utility used to clean potentially unwanted files and invalid Windows Registry entries from a computer. It is one of the longest-established system cleaners, first launched in 2004. It was originally developed for Microsoft Windows only, but in 2012, a macOS version was released. An Android version was released in 2014.

<span class="mw-page-title-main">Defraggler</span> Defragmentation utility for Windows

Defraggler is a freemium defragmentation utility developed by Piriform Software, which can defragment individual files or groups of files on computer memory systems. Defraggler runs on Microsoft Windows; it has support for all versions since Windows XP. It includes support for both IA-32 and x64 versions of these operating systems.

<span class="mw-page-title-main">VirusTotal</span> Cybersecurity website owned by Chronicle

VirusTotal is a website created by the Spanish security company Hispasec Sistemas. Launched in June 2004, it was acquired by Google in September 2012. The company's ownership switched in January 2018 to Chronicle, a subsidiary of Google.

<span class="mw-page-title-main">Computer virus</span> Computer program that modifies other programs to replicate itself and spread

A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.

Trusteer is a Boston-based computer security division of IBM, responsible for a suite of security software. Founded by Mickey Boodaei and Rakesh K. Loonkar, in Israel in 2006, Trusteer was acquired in September 2013 by IBM for $1 billion.

Avira Operations GmbH & Co. KG is a German multinational computer security software company mainly known for its Avira Free Security antivirus software. Although founded in 2006, the Avira antivirus application has been under active development since 1986 through its predecessor company H+BEDV Datentechnik GmbH. Since 2021, Avira has been owned by American software company NortonLifeLock, which also operates Norton, Avast and AVG. It was previously owned by investment firm Investcorp.

<span class="mw-page-title-main">Avast Antivirus</span> Antivirus computer program

Avast Antivirus is a family of cross-platform internet security applications developed by Avast for Microsoft Windows, macOS, Android, and iOS. Avast offers free and paid products that provide computer security, browser security, antivirus software, firewall, anti-phishing, antispyware, and anti-spam, among other services.

Browser security is the application of Internet security to web browsers in order to protect networked data and computer systems from breaches of privacy or malware. Security exploits of browsers often use JavaScript, sometimes with cross-site scripting (XSS) with a secondary payload using Adobe Flash. Security exploits can also take advantage of vulnerabilities that are commonly exploited in all browsers.

<span class="mw-page-title-main">Avast Secure Browser</span> Chromium-based browser made by Avast

Avast Secure Browser is an Avast Software web browser included for optional installation in the Avast Antivirus installer since 2016, but it is also available on its website. It is based on the open source Chromium project. It is available for Microsoft Windows, macOS, iOS, and Android.

<span class="mw-page-title-main">Vault 7</span> CIA files on cyber war and surveillance

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare. The files, dating from 2013 to 2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs, web browsers including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera, the operating systems of most smartphones including Apple's iOS and Google's Android, and computer operating systems including Microsoft Windows, macOS, and Linux. A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release. The tools were developed by the Operations Support Branch of the CIA.

References

  1. "Piriform Blog - CCleaner Cloud has Launched!". Piriform. 22 September 2015. Archived from the original on 12 April 2016. Retrieved 22 September 2015.
  2. "Piriform Product page". Piriform. Retrieved 10 November 2007.
  3. "Piriform company Info page". Piriform. Retrieved 10 November 2007.
  4. "A first look at CCleaner Cloud - gHacks Tech News". gHacks.net. 25 September 2015. Retrieved 6 October 2017.
  5. 1 2 "Hackers compromised free CCleaner software, Avast's Piriform says". Reuters.com. 18 September 2017. Retrieved 6 October 2017.
  6. Sawers, Paul (19 July 2017). "Avast acquires Piriform, maker of popular system cleaning program CCleaner". VentureBeat.com. Retrieved 19 July 2017.
  7. "CCleanup: A Vast Number of Machines at Risk". blog.TalosIntelligence.com. September 2017. Retrieved 6 October 2017.
  8. Leyden, John (6 October 2017). "Avast urges devs to secure toolchains after hacked build box led to CCleaner disaster". The Register.
  9. "CCleaner Malware". kaspersky.com. 2021-01-13. Retrieved 2021-09-29.
  10. "What is CCleaner Browser?". Piriform Support. Retrieved 2021-10-10.