If you are reading this article, chances are you have CCleaner installed on your computer. News broke out recently that hackers managed to slither a backdoor into two versions of CCleaner – CCleaner 5.33.6162 and v1.07.3191 of CCleaner Cloud. The infection happened via two primary Trojan horses – the Trojan.Floxif and Trojan.Nyetya. If you have one of the following versions of CCleaner installed on your computer, we advise you to read this article in order to learn how to detect and remove the Trojan.Nyetya infection.
|Aims to infect your computer and steal information from it or assume administrative control over it.
|Registry entries added in multiple Windows registry sub-keys, like the “Agomo” key. Suspicious files created on your computer.
|Via CCleaner version 5.33.6162 and CCleaner Cloud version 1.07.3191.
See If Your System Has Been Affected by malware
Malware Removal Tool
|Join Our Forum to Discuss CCleaner Trojan.Nyetya.
How Does Trojan.Nyetya Infect CCleaner
During their research, security experts have established that n artifact was found within the binary of the CCleaner, called CCleaner.pdb. The artifact is located in the following directory:
When researchers cross referenced this with the valid certificate of the software, they have concluded that most likely a hacker compromised a segment of the development in order to create a separate environment that grants it access in order to perform the malicious operations. The way the malware installation works is when you install CCleaner itself, there is a function in it, called ‘__scrt_get_dyn_tls_init_callback’ and it calls a code execution which in turn results to the successful dropping of the payload of the CCleaner Trojan.Nyetya on the infected computer system.
CCleaner Trojan.Nyetya Analysis
Similar to the Floxif trojan, Trojan.Nyetya drops a malicious file, named CBkrdr.dll and this file may be located in the following directory:
→ C:\Program Files\Common Files\System\
After the initial malicious file has been dropped on the infected computer, the virus may modify the registry editor of the infected computer, adding a Windows registry sub-key, going by the name “Agomo”. It has the following location:
In addition to this, the Trojan.Nyetya also connects to a remote C2 server in order to transmit data via HTTPS POST request. The connection is to the following IP address:
From there, it may execute the loader and CCleaner may appear to look normal. However, the Trojan.Nyetya profiles the system, analyses if the user is administrator and transmits data from the infected machine to the C2 server. This data may be:
- Your keystrokes.
- Your saved passwords on your browsers.
- Important documents.
- Screenshots of your desktop.
- Network information. (IP, MAC, Next hop addresses, etc.)
- Financial data.
- Data from external devices (USB, SD cards, etc.)
- Install other malware.
So far is known that there are over 5 million installations of CCleaner each week and the app is installed in all 55 languages it offers, which means that the situation has already spread on a global scale. Security experts have managed to contain the situation by upgrading the software to version 5.34, but it will take time for some users to learn about the breach and update their systems.
In addition to this, Avast, who bought the Piriform, the developers of CCleaner on July 18, have released a report in which law enforcement, Cisco and Avast have conducted their investigations on the matter and have taken down the C&C server of the malware and registered multiple domains which could have been used in the future infections of the both Trojans. This has resulted in the new patched versions which were released, called CCleaner 5.34 and CCleaner Cloud 1.07.3214. This has resulted to the number of infected user machines decreasing from ~2 million to under a million computers.
How to Remove CCleaner Trojan.Nyetya from Your Computer
In order to successfully delete this Trojan horse from your PC, manual removal may prove to be a tricky process. This is why, it is strongly advisable to follow the removal instructions below.
The best course of action according to security experts at this point is to download an advanced anti-malware software which will automatically scan for the malicious objects created and modified by this malware and delete them permanently.
Preparation before removing CCleaner Trojan.Nyetya.
Before starting the actual removal process, we recommend that you do the following preparation steps.
- Make sure you have these instructions always open and in front of your eyes.
- Do a backup of all of your files, even if they could be damaged. You should back up your data with a cloud backup solution and insure your files against any type of loss, even from the most severe threats.
- Be patient as this could take a while.
CCleaner Trojan.Nyetya FAQ
What Does CCleaner Trojan.Nyetya Trojan Do?
The CCleaner Trojan.Nyetya Trojan is a malicious computer program designed to disrupt, damage, or gain unauthorized access to a computer system.
It can be used to steal sensitive data, gain control over a system, or launch other malicious activities.
Can Trojans Steal Passwords?
Yes, Trojans, like CCleaner Trojan.Nyetya, can steal passwords. These malicious programs are designed to gain access to a user's computer, spy on victims and steal sensitive information such as banking details and passwords.
Can CCleaner Trojan.Nyetya Trojan Hide Itself?
Yes, it can. A Trojan can use various techniques to mask itself, including rootkits, encryption, and obfuscation, to hide from security scanners and evade detection.
Can a Trojan be Removed by Factory Reset?
Yes, a Trojan can be removed by factory resetting your device. This is because it will restore the device to its original state, eliminating any malicious software that may have been installed. Bear in mind, that there are more sophisticated Trojans, that leave backdoors and reinfect even after factory reset.
Can CCleaner Trojan.Nyetya Trojan Infect WiFi?
Yes, it is possible for a Trojan to infect WiFi networks. When a user connects to the infected network, the Trojan can spread to other connected devices and can access sensitive information on the network.
Can Trojans Be Deleted?
Yes, Trojans can be deleted. This is typically done by running a powerful anti-virus or anti-malware program that is designed to detect and remove malicious files. In some cases, manual deletion of the Trojan may also be necessary.
Can Trojans Steal Files?
Yes, Trojans can steal files if they are installed on a computer. This is done by allowing the malware author or user to gain access to the computer and then steal the files stored on it.
Which Anti-Malware Can Remove Trojans?
Anti-malware programs such as SpyHunter are capable of scanning for and removing Trojans from your computer. It is important to keep your anti-malware up to date and regularly scan your system for any malicious software.
About the CCleaner Trojan.Nyetya Research
The content we publish on SensorsTechForum.com, this CCleaner Trojan.Nyetya how-to removal guide included, is the outcome of extensive research, hard work and our team’s devotion to help you remove the specific trojan problem.
How did we conduct the research on CCleaner Trojan.Nyetya?
Please note that our research is based on an independent investigation. We are in contact with independent security researchers, thanks to which we receive daily updates on the latest malware definitions, including the various types of trojans (backdoor, downloader, infostealer, ransom, etc.)
Furthermore, the research behind the CCleaner Trojan.Nyetya threat is backed with VirusTotal.
To better understand the threat posed by trojans, please refer to the following articles which provide knowledgeable details.