Feeds

Sophos antivirus classifies its own update kit as malware

Fix issued swiftly, but naturally difficult to install!

5 things you didn’t know about cloud backup

Sophos users woke up to mayhem on Thursday after the business-focussed antivirus firm released an update that classified itself and any other update utility as a virus.

As a result enterprise PCs running the application went haywire, generating false positives reporting SSH/Updater-B malware. Sysadmins were bombarded with automated alerts by email about the bogus problem. The issue was resolved with a functional update, issued on Wednesday evening.

For many, troubles continue because many endpoints and corporate networks hit by the false positive have been left with systems that can no longer update themselves properly because the required functionality has been consigned to quarantine.

A knowledgebase article from Sophos explaining what to do to resolve the problem can be found here.

False positives hitting antivirus updates have affected all vendors from time to time. The consequent problems are at their worst when Windows operating system files are falsely classified as potentially malign and quarantined, resulting in unstable or unusable Windows boxes.

Sophos's auto-immune screwup caused just as much if not more pain, judging by the large number of reader emails we've already received on the topic.

"About 9.20 this evening, every PC on my network (about 100 of them) started sending me an email every 10 minutes saying that a virus had been detected in one of the DLL files of Sophos Endpoint Security & Control," said Reg reader Iain H in an email that's typical of those we've received.

"It's obviously a nasty false positive - in that it is disabling the AV itself so (a) we're open to threats and (b) it may not be able to update itself when the new signatures are released," added the hard-hit admin.

Iain spent some time trying to get someone from Sophos support on the phone before receiving confirmation that a false positive was behind the snafu.

"It's a bit of a face-plant: classifying your own product as a virus. Still, I am sympathetic. Whilst 'friendly fire' is never a good thing, it's perhaps an inevitable accidental consequence of any long-running and intense conflict. However friendly fire normally means shooting your friends - not your own foot," he added.

Questions will inevitably arise about Sophos's testing and quality assurance process in the aftermath of the screw-up. Glenn C explains the impact of the problem.

"A fix was quickly released from Sophos but the auto-update program was quarantined and wasn't allowed to run.  For a home user, a quick disabling of on-access scan, update, re-enable on-access scan and remove any items marked with the Shh/Updater-B virus from quarantine fixed the issue," he said.

"For corporate users, it was a little more problematic as it's not possible to remove items from the quarantine using the Enterprise Console. You can use the Enterprise Console to push out a new policy with either on-access disabled (not recommended) or at least excluding the Sophos auto-update folder from on-access scanning.  This meant it was possible to get the latest update out to the clients - however it is still necessary to go to every single impacted system and clean out the quarantined items. Ouchie."

Customer discussion of the issue can be found here. ®

The essential guide to IT transformation

More from The Register

next story
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
HP: NORKS' cyber spying efforts actually a credible cyberthreat
'Sophisticated' spies, DIY tech and a TROLL ARMY – report
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?