Sophos flags own update as malware

Powered by SC Magazine
 

Anti-anti-virus?

Sophos has admitted that it suffered a false positive incident last week when its own anti-virus software began detecting an update as malware.

Numerous binaries were falsely detected as 'ssh/updater-B'.

“An identity released by SophosLabs for use with our Live Protection system is causing false positives against many binaries that have updating functionality,” Sophos wrote in a support document.

It moved to confirm that these were false positives and not a malware outbreak.

“If you have Live Protection enabled, you should stop seeing these detections eventually as the files are now marked ‘clean' in the Live Protection cloud. If you do not have Live Protection enabled you will stop seeing the new detections once javab-jd.ide has been downloaded by your endpoints.”

Users would see the file quarantined unless they have their on-access policy set to move or delete detections when clean-up was not possible.

“Please double check your SAV policy under clean-up; You want to ensure your secondary option (when clean-up is not available or does not work) is set to ‘deny access' and not delete or move. Once the detections have stopped, you can acknowledge the alerts in the console, this way you can see who is still reporting it, and confirm it is trending down,” it said.

However this has led to the Sophos Support Twitter page dealing with complaints and frustrated users. It also posted several messages informing that its "call centres are bottlenecked".

One reader on the Internet Storm Centre said the glitch affected other updater services including Adobe Flash, Oracle Java, Fujitsu AutoUpdater and Dell AutoUpdate Utilities.

“All of the auto-updaters mentioned above were deleted off hundreds of PCs. Now none of these applications will auto-update moving forward,” they wrote.

“Even though Sophos may have fixed the problem and fixed their own software, there is a monumental amount of work we have to do to clean up after this mess. I've worked in IT for 16 years and have never had a virus/Trojan/spyware/malware cause problems and disrupt our systems the way this did. Who can I trust anymore when even my security anti-virus vendor can wreak more havoc on our systems than a virus infection outbreak can?”

It followed a borked update of McAfee's anti-virus system which severed internet connections and disabled the client.

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


Sophos flags own update as malware
 
 
 
Top Stories
How hard do you hack back?
[Blog post] Taking the offensive could have unintended consequences.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1015

Vote