Comprehensive data protection for all workloads
Post Reply
iDeNt_5
Service Provider
Posts: 44
Liked: 11 times
Joined: Feb 09, 2024 5:34 pm
Full Name: Matteo Fringuelli
Contact:

Feature request: Improve default malware detection exclusions

Post by iDeNt_5 »

Case reference 07751303

Hi all,

As requested by the Veeam Support Team, I created a new feature request aimed to improve the Malware Detection default exclusions of the VBR.

As explained in this support case, the VBR malware detection marks as infected the following component of the VBO v8 (latest version) server:
C:\ProgramData\Microsoft\NetFramework\BreadcrumbStore\netcore,Veeam.Backup.Interaction.Explorer

Since this is a default embedded component of the VBO, it should not required to manually create a specific exclusion on the Malware Detection component of the VBR.

Thanks.
david.domask
Veeam Software
Posts: 3048
Liked: 705 times
Joined: Jun 28, 2016 12:12 pm
Contact:

Re: Feature request: Improve default malware detection exclusions

Post by david.domask » 1 person likes this post

Hi iDeNt_5,

Thanks for sharing the case number. I was able to reproduce, and it's not really about the component, it's about the .Explorer part of the name which is being parsed as an extension, which is a real extension used by the Explorer ransomware, so a case of unfortunate naming + match.

Agree though that it should be handled better. Will discuss internally best way to handle, but for now please continue using the exclusion.
David Domask | Product Management: Principal Analyst
david.domask
Veeam Software
Posts: 3048
Liked: 705 times
Joined: Jun 28, 2016 12:12 pm
Contact:

Re: Feature request: Improve default malware detection exclusions

Post by david.domask » 1 person likes this post

Quick update, we will be resolving this through an update for the Malware Definitions XML, and the false-positive should stop appearing soon. Thanks again for the report!
David Domask | Product Management: Principal Analyst
iDeNt_5
Service Provider
Posts: 44
Liked: 11 times
Joined: Feb 09, 2024 5:34 pm
Full Name: Matteo Fringuelli
Contact:

Re: Feature request: Improve default malware detection exclusions

Post by iDeNt_5 » 1 person likes this post

Hi David,

Thank you so much for the update, really appreciated!
admcomputing
Service Provider
Posts: 27
Liked: 4 times
Joined: Sep 27, 2010 11:01 am
Full Name: ADM Computing Ltd
Contact:

Re: Feature request: Improve default malware detection exclusions

Post by admcomputing »

We are now seeing the below malware detections on a number of our internal Veeam servers which appears to have started since we upgrade to VSCP v9

Potential malware activity detected:
*.loki

c:\ProgramData\Microsoft\NetFramework\BreadcrumbStore\netcore,Serilog.Sinks.Grafana.Loki


Assuming its related, how long will it take for a global exclusion to be pushed out?
david.domask
Veeam Software
Posts: 3048
Liked: 705 times
Joined: Jun 28, 2016 12:12 pm
Contact:

Re: Feature request: Improve default malware detection exclusions

Post by david.domask »

Ah, looks like it's an unfortunate coincidence in this case, as that is from a legitimate .NET package and it's matching on the .Loki element.

The changes to exclusions usually are pushed out in < 24 hours if we make changes to the XML

Will discuss internally on handling this one.
David Domask | Product Management: Principal Analyst
david.domask
Veeam Software
Posts: 3048
Liked: 705 times
Joined: Jun 28, 2016 12:12 pm
Contact:

Re: Feature request: Improve default malware detection exclusions

Post by david.domask »

As a follow up, an updated XML was pushed out to accommodate this false-positive. Thanks for reporting!
David Domask | Product Management: Principal Analyst
Post Reply

Who is online

Users browsing this forum: Amazon [Bot], Semrush [Bot] and 3 guests