Have a suggestion?
Click here to suggest a blog item.
Catch up with DonationCoder by browsing our past newsletters, which collect the most interesting discussions on our site: here.
DonationCoder does not accept paid promotions. We have a strict policy of not accepting gifts of any kind in exchange for placing content in our blogs or newsletters, or on our forum. The content and recommendations you see on our site reflect our genuine personal interests and nothing more.
Feb 24, 2018
Jan 14, 2018
Major Site News
Jan 10, 2018
Fuzzy Feelings UtilityMan, you guys are good! I had this warm and fuzzy feeling about you guys the moment I installed your program. It's so nice to be able to run lean and efficient software, and to be able to converse with the author himself. I look forward to being part of your community and to spread the word about you!
Our daily Blog
This page spotlights the most interesting posts collected from our forum every day.
You are viewing a specific blog item. Click here to return to the main blog page.
Reported by OS News:
Talos recently observed a case where the download servers used by software vendor to distribute a legitimate software package were leveraged to deliver malware to unsuspecting victims. For a period of time, the legitimate signed version of CCleaner 5.33 being distributed by Avast also contained a multi-stage malware payload that rode on top of the installation of CCleaner.
In reviewing the Version History page on the CCleaner download site, it appears that the affected version (5.33) was released on August 15, 2017. On September 12, 2017 version 5.34 was released. The version containing the malicious payload (5.33) was being distributed between these dates.