backtop


Print 25 comment(s) - last by random2.. on Apr 24 at 10:03 PM

Malware software targeted legitimate Windows files

Security vendor Malwarebytes has crippled thousands of computers around the world after a faulty update was applied to its software. The faulty security update applied to the software marked legitimate system files as malware code.

The company admitted to the problem on its official blog earlier this week and has since pulled the faulty update.

"At around 3PM PST yesterday [Tuesday] Malwarebytes released a definitions update that disabled thousands of computers worldwide," wrote Malwarebytes’ Marcin Kleczynski.

"Within eight minutes, the update was pulled from our servers. Immediately thereafter, users flocked to our support helpdesk and forums to ask us for a fix."

The specific operating system files that the malware update targeted included Windows.dll and.exe files. By targeting those files, the security application prevented them from running, taking IT systems and individual computers off-line.
 
One company that uses a software claims that the update knocked 80% of its servers off-line. Malwarebytes maintains that it has begun reworking its update policy to ensure the sort of mistake never happens again.

"We acted over-zealously in that mission and realise far superior procedures around updating are needed. More was expected of us, and we failed," wrote Kleczynski.

"We are commissioning several new resources to stop this from happening again. We are building more redundancy to check our researchers' work and improving our peer review."

Source: V3



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: Effective but risky ...
By bodar on 4/19/2013 4:40:48 AM , Rating: 3
Good advice. The problem here was that users were not even running scans, yet DLLs and EXEs were getting hosed. At my office, we have the Enterprise Edition with real-time protection, and the affected PCs appeared to be compromised by malware, when it was in fact MBAM. Applications would freeze or were unable to launch. The main security suite was inoperable. So naturally, I tried to scan with MBAM and lo and behold, 2000+ "infected" files on one PC, all with the same Trojan. WTF? So I took a closer look and saw all the system files and even MBAM core files. Obviously something was fishy, so, I canceled out, hit up the web and found the support threads showing the problem. But in a way, it was a self-fulfilling prophecy. In our case at least, the program broke the system in a manner that just screamed "malware", so I can see how people could ran headfirst into more trouble, and blindly trust that the anti-malware software knew what it was doing.

Luckily, the company's fix tool worked on most users (those who couldn't even run System Restore) and de-quarantined the affected files, but some required repair installs of Windows. No idea if we'll bother renewing our licenses next year. Kinda sad, considering it's been so good thus far.


"You can bet that Sony built a long-term business plan about being successful in Japan and that business plan is crumbling." -- Peter Moore, 24 hours before his Microsoft resignation











botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki