We encourage all CCleaner users to download the latest version of CCleaner: here. We apologize and are taking extra measures to ensure this does not happen again.
For further information, please read the official announcements linked below.
Official Information
CCleaner v5.33 and CCleaner Cloud v1.07 Security FAQ
https://piriform.zendesk.com/hc/en-us/articles/115001699371
Piriform blog: Security Notification for CCleaner version 5.33.6162 (Monday, 18 September 2017)
Security Notification for a general audience.
Piriform blog: Security Notification with Technical Overview (Monday, 18 September 2017)
A similar announcement to the above, aimed at a technical audience and revealing technical details about the nature of compromise.
Avast blog: Follow-Up Announcement by Avast CEO & CTO (Tuesday, 19 September 2017)
This blogpost confirms the timeline of events surrounding the detection, investigation and announcement of the compromise; what precautions we are advising customers to take and what information we are basing this on; and what precautions we are taking to ensure this does not happen again.
https://blog.avast.com/update-to-the-ccleaner-5.33.6162-security-incident
Avast blog: Investigation Progress Update #1 by Avast Threat Labs team (Thursday, 21 September 2017)
This blogpost reveals more information regarding the target of the attack and more technical details about how the compromise behaves.
https://blog.avast.com/progress-on-ccleaner-investigation
Avast blog: Investigation Progress Update #2 by Avast Threat Labs team (Thursday, 21 September 2017)
This second progress update explains why only part of the command & control server logs were recovered and provides yet deeper technical understanding of the way the malicious code was put together. It also shares some clues as to the identity of the perpetrators.
https://blog.avast.com/avast-threat-labs-analysis-of-ccleaner-incident
Avast blog: Investigation Progress Update #3 by Avast Threat Labs team (Monday, 25 September 2017)
This third progress confirms how many and which companies were specifically targeted by the attack and present a hypothesis on the origin of the perpetrator(s). The blogpost also contains a full list of IOCs (Indicators of Compromise - in this case a list of files whose existence show that a system has at one time been compromised by this attack).
https://blog.avast.com/additional-information-regarding-the-recent-ccleaner-apt-security-incident
Future announcements will be made on the Piriform and Avast blogs.
Piriform Software blog: https://www.piriform.com/news/blog
Avast Software blog: https://blog.avast.com/