Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kaspersky Anti-virus identifies Setup.exe and Update.exe as trojans #218

Closed
chrispret opened this issue Feb 6, 2015 · 16 comments
Closed

Comments

@chrispret
Copy link

Kaspersky's heuristic scan detects both Setup.exe and Update.exe as HEUR:Trojan.Win32.Generic.

Obviously it isn't liking some of the squirrel code. While I was happy to scan the files using a few different engines and none of them resulted in detections, typical end-users might not agree and end up not installing the software.

When I build from the source code, the resulting Setup.exe is detected as well.

It was also a pain to download and install Squirrel.windows through the Visual Studio Package Manager, since Kaspersky deleted Setup.exe every time it was downloaded. I eventually figured out what was going on and set it to prompt me before deleting the file, which made it possible to install it.

@anaisbetts
Copy link
Contributor

While this was originally a problem, these days as long as you sign your installer, most people aren't seeing the virus warnings. Can you send in Setup.exe and Update.exe to Kapersky to whitelist then?

@chrispret
Copy link
Author

I'll submit them.

Is the setup.exe that is distributed through the Visual Studio Package manager signed? If so, there might be value in submitting new versions to them when publishing. If I didn't realize that my anti-virus was deleting the files (without even telling me) I would have never gotten the package installed on my project.

@anaisbetts
Copy link
Contributor

Is the setup.exe that is distributed through the Visual Studio Package manager signed?

No, because the setup.exe we distribute there is a template that we'll edit (and therefore, break the signature)

@cwoolum
Copy link

cwoolum commented Apr 21, 2015

I had the same issue with Bit defender but I sent in Setup.exe and they added it to their database. Not sure if that is possible with Kapersky as well

@JVimes
Copy link

JVimes commented Dec 21, 2015

Symantec Endpoint Protection's generic trojan detector, Trojan.Gen.2, quarantined test\fixtures\Setup.exe. I submitted it on their false positive form.

@anaisbetts
Copy link
Contributor

Thanks @JVimes

@jg123
Copy link

jg123 commented Feb 26, 2016

Windows Defender quarantined the unsigned Update.exe as a Trojan (Trojan:Win32/Codinx.B!plock). I submitted it as not malware here: https://www.microsoft.com/security/portal/submission/SubmissionHistory.aspx?SubmissionId=a1235358-fbb7-4d39-83a8-942440050036&lc=1033

@sawilde
Copy link

sawilde commented Feb 27, 2016

Even signing doesn't always seem to stop these AVs from killing your apps, from I've seen valid apps taken out for all sorts of reasons, signed or not and using OS or commercial installer packages; it's just a constant battle and unfortunately you have to visit every AV vendor to do the whitelisting and no common procedure in place.

@anaisbetts
Copy link
Contributor

Thanks @jg123, people submitting to whitelists whenever bad stuff happens is a huge help

kenbailey pushed a commit to kenbailey/Squirrel.Windows that referenced this issue Mar 26, 2016
kenbailey pushed a commit to kenbailey/Squirrel.Windows that referenced this issue Mar 26, 2016
anaisbetts added a commit that referenced this issue Mar 30, 2016
@muhammetalay
Copy link

Hi there,

How much time passed between the time you guys submitted false positive reports and the antivirus warnings disappeared?

I have the same problem and can't seem to have any progress. I followed the online guide listed at the FAQ document, which is this http://www.techsupportalert.com/content/how-report-malware-or-false-positives-multiple-antivirus-vendors.htm, and submitted reports via both email and website but got no positive response from the Kaspersky. Is there anybody who reached a positive result trying another channel of communication to resolve this? My angry users keep increasing and I'm open to suggestions.

@anaisbetts
Copy link
Contributor

There's nothing we can do about AV vendors hating us, closing this

@JVimes
Copy link

JVimes commented Sep 16, 2016

The other option is to find what API calls look like a virus and refactor until they don't, if possible.

@anaisbetts
Copy link
Contributor

anaisbetts commented Sep 18, 2016

The other option is to find what API calls look like a virus and refactor until they don't, if possible.

I mean, the thing that "looks like a virus" is the fact that we install software - the funny thing about Squirrel is, from a "what it actually does" perspective it really does look a lot like malware - it unpacks and installs code to your computer and executes it, and it downloads code from the Internet in the background and runs it. The difference of course being, that we do it with the user's consent, and malware doesn't :)

@JVimes
Copy link

JVimes commented Sep 18, 2016

Ahh right ;) It's probably wishful thinking that we could avoid the malware fingerprint. Hoping proper signing is the key, here.

@anaisbetts
Copy link
Contributor

Signing makes a huge difference for distributing to your users, you'll most likely see this issue go away

@jvoisin
Copy link

jvoisin commented Jan 27, 2017

No, because the setup.exe we distribute there is a template that we'll edit (and therefore, break the signature)

What about signing the resulting binary? Using a template shouldn't make any differences…

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

8 participants