Feeds

McAfee AV ate my application

False Trojan horse alert causes chaos

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

An Australian software developer has been left fuming after the latest virus definition update from McAfee caused his package to be wrongly identified as a Trojan horse programme.

The false positive meant that ISPWizard, an internet setup program wizard, was labelled as the BackDoor-AKZ Trojan by users running the latest update of McAfee's AV software. As a result, ISPWizard is being unceremoniously ripped from users' systems. This means that many people are unable to connect to their ISPs because the software that they need has been automatically deleted by McAfee.

McAfee's cock-up dates from 1 September when it released an antivirus DAT (signature file) update. It has yet to rectify its mistake.

ISPWizard Developer Mark Griffiths slammed McAfee's tardy response: "This is causing major problems for my business, the businesses of my customers [ISPs] and also their customers as well. Despite this problem being quickly reported to McAfee and it being stressed to them that this is a major problem which is causing damage to many businesses, they have been very slow to react," he said.

"Although they have now responded and admitted that this is a problem with their software, they have still not released a new update to their DAT files to fix the problem and say that it may take until Thursday [9 September] before it is actually released. In the meantime, the software continues to misidentify my software as being infected by a Trojan. End users that are being affected are either contacting the ISP for assistance and blaming them for distributing a Trojan - greatly increasing the support burden and costs for the ISP, or they are simply switching to another ISP," he added.

Other AV vendors (for example, Sophos) detect the BackDoor-AKZ Trojan without interfering with the operation of ISPWizard. "I'm not aware of any other anti-virus program that is misidentifying my software at the moment," said Griffiths.

So why is McAfee AV misdiagnosing a benign program as malignant? We don't know. Our repeated calls and emails to McAfee over the last two days failed to generate a response from the company

In copies of email correspondence between Griffiths and Avert Labs, McAfee's AV research division, a suggestion was made that the misdiagnosis could have arisen because components of ISPWizard were created with the same package as components of the backdoor Trojan program. But this remains only a theory. McAfee has offered Griffiths a temporary DAT file that end users would need to manually install on their systems as a workaround. Griffiths is unimpressed with the offer: he is frustrated that McAfee has not released an emergency automatic update. ®

Related stories

Email deletion bug baffles McAfee
Murder on the Outlook Express
McAfee virus update damages NT 4.0 files
McAfee virus update freezes PCs
Email deletion bug bites Norton Internet Security
Symantec undeletes mail deletion bug

The smart choice: opportunity from uncertainty

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.