{"id":20456,"date":"2022-12-07T04:36:15","date_gmt":"2022-12-07T09:36:15","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/is-avast-safe\/20456\/"},"modified":"2022-12-07T13:44:50","modified_gmt":"2022-12-07T09:44:50","slug":"is-avast-safe","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/is-avast-safe\/20456\/","title":{"rendered":"Is Avast Safe to Use in 2023?"},"content":{"rendered":"<p>Now part of the multinational company Gen Digital, Avast has reputation for making effective security solutions to combat viruses and other threats. But how safe and reliable are they? In this post we examine why some users are suspicious of Avast, and whether you can still trust this developer\u2019s products.<\/p>\n<h2>Is Avast safe?<\/h2>\n<p>Avast solutions are popular with millions of users worldwide. Independent experts rate them highly too: in the <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/selabs.uk\/reports\/home-endpoint-protection-2022-q2\/\">SE Labs test for Q2 2022<\/a>, for instance, Avast software detected 98% of threats \u2014 only slightly worse than both Kaspersky and McAfee, which shared the top spot (100% of threats). That said, over the years Avast has had its fair share of unpleasant incidents, which make many users and experts question <strong>how safe their products really are<\/strong>.<\/p>\n<h2>Avast security issues<\/h2>\n<p>Avast has let its users down many a time. In 2017, <strong>more than two million<\/strong> people <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/ccleaner-supply-chain\/21785\/\" rel=\"noopener nofollow\">downloaded<\/a> a malware-infected version of CCleaner \u2014 one of the company\u2019s solutions.<\/p>\n<p>Even more unfortunate for Avast was 2019. That year, the <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/blog.avast.com\/ccleaner-fights-off-cyberespionage-attempt-abiss\">company reported<\/a> that its internal network had been compromised by intruders, whose goal was most likely gaining access to that selfsame CCleaner. But the company\u2019s problems in 2019 didn\u2019t end there. A short while later, independent experts <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/palant.info\/2019\/10\/28\/avast-online-security-and-avast-secure-browser-are-spying-on-you\/\">revealed<\/a> that Avast browser extensions collect users\u2019 data without their knowledge\u00a0\u2014 far more than is necessary for protection.<\/p>\n<p>And in the beginning of 2020 it was <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.pcmag.com\/news\/the-cost-of-avasts-free-antivirus-companies-can-spy-on-your-clicks\">reported<\/a> that Avast was sharing users\u2019 data with its subsidiary, Jumpshot, which then sold it to large corporations.<\/p>\n<p>To work effectively, antivirus software needs full access to the given device and its operating system (otherwise it cannot detect and neutralize viruses and other threats). It also has to be in constant contact with the servers to keep the databases up to date. Thus, when choosing an antivirus, it\u2019s important to pay attention to its reputation.<\/p>\n<p>Once installed, Avast has access to huge amounts of user data. And while to date there\u2019s no evidence of unscrupulous behavior on the company\u2019s part or insecurity of its products, more than a few incidents over the years may make users wonder if Avast solutions can be trusted.<\/p>\n<h3>Malicious code in CCleaner<\/h3>\n<p>In July 2017, Avast <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/Avast\">bought<\/a> the British company Piriform, developer of the above-mentioned CCleaner \u2014 a popular PC optimization and maintenance solution with a total of two billion downloads (as of 2016).<\/p>\n<p>Shortly afterward, on August 15 and 24, new versions of the product were released: CCleaner 5.33.6162 and CCleaner Cloud 1.7.0.3191. And as early as September, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/blog.talosintelligence.com\/avast-distributes-malware\/\">Cisco Talos<\/a> and <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/blog.morphisec.com\/morphisec-discovers-ccleaner-backdoor\">Morphisec<\/a> experts found malicious code in the installers of this software. The infected solutions were signed with valid digital certificates and hosted directly on the official CCleaner server.<\/p>\n<p>Further <a target=\"_blank\" href=\"https:\/\/blog.talosintelligence.com\/ccleaner-c2-concern\/\" rel=\"noopener nofollow\">investigation<\/a> showed the attack to be sophisticated, and consisting of at least three stages. In stage one, the infected CCleaner was downloaded by more than two million users. Next, a script running on the command-and-control server selected devices with domain names that suggested their owners work for large IT companies. This way, in stage two, 40 computers were <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.kaspersky.com\/blog\/ccleaner-supply-chain\/21785\/\">selected<\/a>. From these 40 devices, the cybercriminals (probably manually this time) picked out the four targets of most interest to them.<\/p>\n<p>Stage three: on these four devices they then installed a modified version of <a target=\"_blank\" href=\"https:\/\/securelist.com\/shadowpad-in-corporate-networks\/81432\/\" rel=\"noopener\">ShadowPad<\/a>. This malware covertly gave the attackers remote control over their victims\u2019 devices. Experts later <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.securityweek.com\/researchers-link-ccleaner-attack-state-sponsored-chinese-hackers\">suggested<\/a> that the Chinese group Axiom (aka APT17) was behind the attack.<\/p>\n<p>What\u2019s important to mention is that the first traces of cybercriminal activity on Piriform\u2019s servers date back to April 2017, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/blog.avast.com\/update-ccleaner-attackers-entered-via-teamviewer\">three months before it was acquired<\/a> by Avast. After the attack was detected, Avast promptly <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/blog.avast.com\/progress-on-ccleaner-investigation\">released an update<\/a> for the utility, revoked the malicious version\u2019s certificate, and <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/blog.avast.com\/additional-information-regarding-the-recent-ccleaner-apt-security-incident\">contacted<\/a> everyone affected by stage two of the attack.<\/p>\n<h3>Attack through a neglected VPN<\/h3>\n<p>In May 2019, unknown criminals <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.securityweek.com\/avast-discloses-new-supply-chain-attack-attempt\">infiltrated<\/a> Avast\u2019s internal network using a temporary VPN profile that didn\u2019t have two-factor authentication. Four months later, Avast\u2019s experts <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/blog.avast.com\/ccleaner-fights-off-cyberespionage-attempt-abiss\">detected suspicious activity<\/a> in the corporate network and sounded the alarm.<\/p>\n<p>The company immediately contacted law enforcement and launched an investigation. It was revealed that the cybercriminals had tried to connect to the company\u2019s network through a VPN using the (presumably stolen) credentials of different users. The compromised account that eventually delivered access to the network lacked domain administrator privileges, but the intruders were able to elevate their rights to that level.<\/p>\n<p>On the back of the investigation, Avast pointed the finger at CCleaner as the likely target \u2014 as it had been two years earlier. And it turned out that the repeat attack had been made possible by the temporary VPN profile having been \u201cleft active by mistake\u201d.<\/p>\n<p>Avast suspended the release of CCleaner updates after detection of the attack. A little less than a month later, the company released a \u201cclean\u201d update of the solution signed with a new certificate, and revoked the certificate used for signing previous versions. Avast claims that no harm was caused to users as a result of the incident.<\/p>\n<h3>Overly curious extensions<\/h3>\n<p>Unfortunately, Avast has suffered some unpleasant incidents in relation not only to security, but also to user data privacy. In 2019, cybersecurity expert Vladimir Palant <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/palant.info\/2019\/10\/28\/avast-online-security-and-avast-secure-browser-are-spying-on-you\/\">argued<\/a> that Avast Online Security, Avast SafePrice, as well as AVG Online Security and AVG SafePrice extensions (made by another <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/AVG_AntiVirus\">Czech antivirus developer<\/a> bought by Avast several years earlier) collect and forward to the company\u2019s servers volumes of data about users\u2019 online activity that were clearly way over and above what is needed.<\/p>\n<p>The information collected by the company was sufficient to determine which sites users visited and what they searched for online. Palant also reported that this data could be used to establish how much time users spent viewing a site, what they clicked on, and when they switched to another browser window.<\/p>\n<p>Palant\u2019s revelation provoked much public outcry, leading to Avast extensions being <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.gadgets360.com\/apps\/news\/google-removes-avast-avg-browser-extensions-from-chrome-web-store-2150883\">removed<\/a> from the Chrome, Opera, and Firefox official stores as a result. However, after the company started warning users about its data harvesting, and significantly reduced the amount of information it collected, Avast extensions were <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/avast-and-avg-firefox-extensions-added-back-to-mozilla-addons-site\/\">allowed<\/a> back into the stores.<\/p>\n<h3>Sale of user data<\/h3>\n<p>In early 2020, Avast found itself at the heart of another scandal related to user data privacy. This time, a <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.vice.com\/en\/article\/qjdkq7\/avast-antivirus-sells-user-browsing-data-investigation\">joint investigation<\/a> by <em>PCMag<\/em> and <em>Motherboard<\/em> based on documents leaked online accused Avast of harvesting users\u2019 browser history and selling it on to large corporations through its subsidiary Jumpshot.<\/p>\n<p>The \u201cuser dossiers\u201d seen by <em>PC Mag<\/em> and <em>Motherboard<\/em> included:<\/p>\n<ul>\n<li>Google search history;<\/li>\n<li>Google Maps search history (locations, GPS coordinates);<\/li>\n<li>YouTube videos;<\/li>\n<li>Porn site visits.<\/li>\n<\/ul>\n<p>Also the date and time of users\u2019 visits to sites like YouPorn and PornHub could be determined using the collected data, and in some cases even search-keywords and videos watched.<\/p>\n<p><em>PC Mag<\/em> <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.pcmag.com\/news\/the-cost-of-avasts-free-antivirus-companies-can-spy-on-your-clicks\">noted<\/a> that the collected data contained neither names, e-mails, nor IP addresses. However, each user was assigned an ID, which was retained until Avast was removed from their device. Armed with this ID and the data sold by Jumpshot, large corporations like Amazon could easily de-anonymize users.<\/p>\n<p>The scandal wiped <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.reuters.com\/article\/avast-dataprotection-idUKL4N29Z2CF\">9% off Avast\u2019s share price<\/a>. To its credit, the company <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/blog.avast.com\/a-message-from-avast\">accepted it was in the wrong<\/a> and announced the closure of Jumpshot.<\/p>\n<h2>What is Avast Premium Antivirus?<\/h2>\n<p>Avast Premium Antivirus is a <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/what-is-cyber-security\" rel=\"noopener nofollow\">cybersecurity<\/a> solution developed by Avast, which is headquartered in Prague, the Czech Republic. As the name would suggest, Avast Premium Antivirus offers users , as well as all-round security. Avast Premium Antivirus is designed to <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/downloads\/free-virus-removal-tool\" rel=\"noopener nofollow\">remove malware<\/a>, defend against <a href=\"https:\/\/me-en.kaspersky.com\/blog\/kaspersky-anti-ransomware-tool-for-business\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=me-en_KB_nv0092&amp;utm_content=link&amp;utm_term=me-en_kdaily_organic_1drobvqxak929hs\" target=\"_blank\" rel=\"noopener\">ransomware<\/a>, and block <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/what-is-hacking\" rel=\"noopener nofollow\">hacking attempts<\/a> on Windows, Mac, Android, and iOS devices.<\/p>\n<h3>About Avast<\/h3>\n<p>Avast was founded in 1988 in Czechoslovakia by Pavel Baudi\u0161 and Eduard Ku\u010dera. Over its 30-year-plus history, it has grown into one of the largest players in the antivirus market. Avast solutions regularly <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.av-comparatives.org\/awards\/avast\/\">receive<\/a> awards from independent industry expert companies.<\/p>\n<p><strong>Avast at a glance:<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Industry<\/strong><\/td>\n<td>Information technology, antivirus software<\/td>\n<\/tr>\n<tr>\n<td><strong>Founded<\/strong><\/td>\n<td>Prague, Czechoslovakia, 1988<\/td>\n<\/tr>\n<tr>\n<td><strong>Founders<\/strong><\/td>\n<td>Eduard Ku\u010dera<br>\nPavel Baudi\u0161<\/td>\n<\/tr>\n<tr>\n<td><strong>Notable products<\/strong><\/td>\n<td>Avast Free Antivirus<br>\nAvast Premium Antivirus<br>\nAvast Ultimate<\/td>\n<\/tr>\n<tr>\n<td><strong>Historical events<\/strong><\/td>\n<td><strong>1991<\/strong>\u00a0\u2014 The company Awil is transformed from a cooperative into a partnership<br>\n<strong>2010<\/strong>\u00a0\u2014 Awil is renamed Avast<br>\n<strong>2016<\/strong>\u00a0\u2014 Avast acquires AVG<br>\n<strong>2017<\/strong>\u00a0\u2014 Avast acquires Piriform (developer of CCleaner)<br>\n<strong>2018<\/strong>\u00a0\u2014 Avast floats on the London Stock Exchange<br>\n<strong>2022<\/strong>\u00a0\u2014 Avast merges with NortonLifeLock<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Can Avast be trusted?<\/h3>\n<p>Avast products are generally held in high esteem: they perform well in independent tests and effectively neutralize threats. Unfortunately, however, a string of unpleasant incidents has left a question mark hanging over the company. Some experts have even gone so far as to <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.safetydetectives.com\/blog\/avast-scandal-why-we-stopped-recommending-avast-avg\/\">stop recommending it<\/a>.<\/p>\n<p>For its part, Avast <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.avast.com\/digital-trust\">has stated<\/a> that all the above-mentioned issues have been fixed. Currently there\u2019s no information of any security risk associated with use of its products.<\/p>\n<p>However, if you\u2019re not quite ready to take a leap of faith, you could always choose a <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">top-quality alternative<\/a>\u00a0\u2014 for example, from Kaspersky, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/top3\" rel=\"noopener nofollow\">a company with deep understanding of the current cybersecurity landscape<\/a>.<\/p>\n<h2>Choose security software you can <em>truly<\/em> trust<\/h2>\n<p>Kaspersky has always championed cybersecurity without borders. Our products detect and neutralize threats of any origin. Kaspersky experts continuously monitor the security landscape, find and investigate new threats, and share their findings with clients and competitors alike.<\/p>\n<p>We do not collect user data beyond what is necessary for protection. As part of our <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/transparency-update-2022\/44156\/\" rel=\"noopener nofollow\">Global Transparency Initiative<\/a>, Kaspersky has opened a network of Transparency Centers to provide partners and clients with information about how we handle user data. The Centers also allow our partners and clients to verify that Kaspersky solutions contain no hidden or malicious functionality.<\/p>\n<p>Kaspersky products regularly take first place in <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/top3-awards-2021\/44050\/\" rel=\"noopener nofollow\">independent tests<\/a>. More than 400 million users and counting <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/about\" rel=\"noopener nofollow\">place their trust<\/a> in us, and numerous independent audits continue to prove the effectiveness of our solutions against all kinds of threats.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>Avast solutions have a pretty good reputation, but a handful of incidents call their safety into question. Read on to learn whether Avast can be trusted.<\/p>\n","protected":false},"author":2706,"featured_media":20457,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7,1226],"tags":[2088,477,2608,43,97,131],"class_list":{"0":"post-20456","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-products","8":"category-technology","9":"tag-tips","10":"tag-apt","11":"tag-avast","12":"tag-privacy","13":"tag-security-2","14":"tag-tips-2"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/is-avast-safe\/20456\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/is-avast-safe\/24960\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/is-avast-safe\/10333\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/is-avast-safe\/27520\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/is-avast-safe\/25290\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/is-avast-safe\/28180\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/is-avast-safe\/34340\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/is-avast-safe\/11178\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/is-avast-safe\/46519\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/is-avast-safe\/25645\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/is-avast-safe\/31337\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/is-avast-safe\/31046\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/tips-2\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20456"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20456\/revisions"}],"predecessor-version":[{"id":20458,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20456\/revisions\/20458"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20457"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}