McAfee update chaos sparks user fury

Powered by SC Magazine
 

Enterprises offered hotfix, consumers asked to reinstall.

McAfee customers had internet access severed and were left exposed to malware after the company issued a glitched anti-virus update.

The update affected all Windows McAfee suites and VirusScan products including the latest version of VirusScan Enterprise and McAfee Security Center.

Anti-virus signature updates (DAT 6807, 6808) would disable the anti-virus clients, and in some cases sever internet access.

McAfee overnight issued an enterprise 100Mb Super DAT (Hotfix 793640) and a consumer fix (DAT 6809) for the borked updates which it rated as ‘critical’.

Enterprise customers had to apply the hotfix as a product update through the e-policy orchestrator, while consumers were advised to remove McAfee from affected machines and re-install the product in order for the fix to be applied.

Furious enterprise and business customers posted comments yesterday on the McAfee blog claiming they were left high and dry after thousands of machines within their companies were left exposed by the updates.

“I currently have over 3000 endpoints with this problem - solution ASAP please McAfee,” customer Derosa wrote.

Another customer, Bostjanc, said they had 46 of 152 machines affected. “Soo theoretically if one of those users … gets a virus and spreads out to rest of the 45 computers, what then?"

“Then I'm f***ed as an anti-virus technical support.”

Another user had 70 systems of 2100 affected, including two "high profile" users. 

Meanwhile, some consumers took to McAfee’s Facebook account to vent anger where support officers were assisting with technical support.

The borked update followed one issued by McAfee in April that crashed email services, and another by Microsoft for its anti-virus product that flagged Google as hosting the malicious Blackhole exploit kit.

AusCERT security analyst Jonathan Levine said organisations should test antivirus updates before live deployment.

“Everything should be tested before going live as part of best practice,” Levine said.

But he doubted many organisations would bother with testing.

Some users writing on the SANS Internet Storm Center supported the suggestion, saying the cost of testing may outweigh the resources to fix “the occasional glitch”.

Others had comprehensive testing procedures. One McAfee user ran an 18-hour delayed deployment schedule in their organisation in which an evaluation branch would test DAT files on a group of servers and workstations before releasing it to another branch for staggered deployment the next day.

“This has saved us during the bad DAT times … if there is an issue, we are usually only one or two DAT releases behind but catch up during the day,” they said.

Copyright © SC Magazine, Australia


McAfee update chaos sparks user fury
 
 
 
Top Stories
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
Will Nutanix be outflanked before reaching IPO?
VMware muscles in on storage startup in hyper-converged infrastructure.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Looking for storage? Seagate has five new small business NAS devices
Aug 22, 2014
Seagate has announced a new portfolio of Networked Attached Storage (NAS) solutions specifically ...
Run a small business in western Sydney?
Aug 15, 2014
This event might be of interest if you're looking to meet other people with a similar interest ...
Buying a tablet? Microsoft's Surface Pro 3 goes on sale this month
Aug 8, 2014
Microsoft has announced its Surface Pro 3 will go on sale in Australia on 28 August from ...
Apple's top MacBook Pro with Retina is now cheaper
Aug 1, 2014
Apple has updated its MacBook Pro range with faster processors and new pricing, including ...
Pass on carbon tax savings, warns ACCC
Jul 24, 2014
The ACCC is warning businesses that supply "regulated goods" to pass on any cost savings ...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 608

Vote