-
iDeNt_5
- Service Provider
- Posts: 44
- Liked: 11 times
- Joined: Feb 09, 2024 5:34 pm
- Full Name: Matteo Fringuelli
- Contact:
Feature request: Improve default malware detection exclusions
Case reference 07751303
Hi all,
As requested by the Veeam Support Team, I created a new feature request aimed to improve the Malware Detection default exclusions of the VBR.
As explained in this support case, the VBR malware detection marks as infected the following component of the VBO v8 (latest version) server:
C:\ProgramData\Microsoft\NetFramework\BreadcrumbStore\netcore,Veeam.Backup.Interaction.Explorer
Since this is a default embedded component of the VBO, it should not required to manually create a specific exclusion on the Malware Detection component of the VBR.
Thanks.
Hi all,
As requested by the Veeam Support Team, I created a new feature request aimed to improve the Malware Detection default exclusions of the VBR.
As explained in this support case, the VBR malware detection marks as infected the following component of the VBO v8 (latest version) server:
C:\ProgramData\Microsoft\NetFramework\BreadcrumbStore\netcore,Veeam.Backup.Interaction.Explorer
Since this is a default embedded component of the VBO, it should not required to manually create a specific exclusion on the Malware Detection component of the VBR.
Thanks.
-
david.domask
- Veeam Software
- Posts: 3048
- Liked: 705 times
- Joined: Jun 28, 2016 12:12 pm
- Contact:
Re: Feature request: Improve default malware detection exclusions
Hi iDeNt_5,
Thanks for sharing the case number. I was able to reproduce, and it's not really about the component, it's about the .Explorer part of the name which is being parsed as an extension, which is a real extension used by the Explorer ransomware, so a case of unfortunate naming + match.
Agree though that it should be handled better. Will discuss internally best way to handle, but for now please continue using the exclusion.
Thanks for sharing the case number. I was able to reproduce, and it's not really about the component, it's about the .Explorer part of the name which is being parsed as an extension, which is a real extension used by the Explorer ransomware, so a case of unfortunate naming + match.
Agree though that it should be handled better. Will discuss internally best way to handle, but for now please continue using the exclusion.
David Domask | Product Management: Principal Analyst
-
david.domask
- Veeam Software
- Posts: 3048
- Liked: 705 times
- Joined: Jun 28, 2016 12:12 pm
- Contact:
Re: Feature request: Improve default malware detection exclusions
Quick update, we will be resolving this through an update for the Malware Definitions XML, and the false-positive should stop appearing soon. Thanks again for the report!
David Domask | Product Management: Principal Analyst
-
iDeNt_5
- Service Provider
- Posts: 44
- Liked: 11 times
- Joined: Feb 09, 2024 5:34 pm
- Full Name: Matteo Fringuelli
- Contact:
Re: Feature request: Improve default malware detection exclusions
Hi David,
Thank you so much for the update, really appreciated!
Thank you so much for the update, really appreciated!
-
admcomputing
- Service Provider
- Posts: 27
- Liked: 4 times
- Joined: Sep 27, 2010 11:01 am
- Full Name: ADM Computing Ltd
- Contact:
Re: Feature request: Improve default malware detection exclusions
We are now seeing the below malware detections on a number of our internal Veeam servers which appears to have started since we upgrade to VSCP v9
Potential malware activity detected:
*.loki
c:\ProgramData\Microsoft\NetFramework\BreadcrumbStore\netcore,Serilog.Sinks.Grafana.Loki
Assuming its related, how long will it take for a global exclusion to be pushed out?
Potential malware activity detected:
*.loki
c:\ProgramData\Microsoft\NetFramework\BreadcrumbStore\netcore,Serilog.Sinks.Grafana.Loki
Assuming its related, how long will it take for a global exclusion to be pushed out?
-
david.domask
- Veeam Software
- Posts: 3048
- Liked: 705 times
- Joined: Jun 28, 2016 12:12 pm
- Contact:
Re: Feature request: Improve default malware detection exclusions
Ah, looks like it's an unfortunate coincidence in this case, as that is from a legitimate .NET package and it's matching on the .Loki element.
The changes to exclusions usually are pushed out in < 24 hours if we make changes to the XML
Will discuss internally on handling this one.
The changes to exclusions usually are pushed out in < 24 hours if we make changes to the XML
Will discuss internally on handling this one.
David Domask | Product Management: Principal Analyst
-
david.domask
- Veeam Software
- Posts: 3048
- Liked: 705 times
- Joined: Jun 28, 2016 12:12 pm
- Contact:
Re: Feature request: Improve default malware detection exclusions
As a follow up, an updated XML was pushed out to accommodate this false-positive. Thanks for reporting!
David Domask | Product Management: Principal Analyst
Who is online
Users browsing this forum: Baidu [Spider], Bing [Bot], mkretzer, petesteven, tyler.jurgens and 43 guests