Security software firm Malwarebytes, smarting from its update error last week that disrupted thousands of computers, has revamped its process for testing its malware-definitions file.
On 15 April, the company posted a regularly scheduled update for its definition database, the file its product uses to identify potentially bad software. The update caused Malwarebytes’ Anti-Malware (MBAM) to quarantine valid system files, disabling computers protected by the software.
The company pulled the update from its servers within eight minutes, but thousands of computers had downloaded the new definitions and subsequently crashed, the company said in a blog post.
On 18 April, the company posted more details about the incident and its response. The update that caused MBAM to identify system files as malicious code – a “false positive” in industry parlance – was caused by a corrupted file, not a developer mistake, according to the post. Yet, other mistakes compounded the issue, Kleczynski told eWEEK in an email.
“We were in a rush to update a zero-hour exploit that was not detected by any other virus engines on Virus Total, and in our rush, we made several critical mistakes,” he said. “Again, nothing is more important to us than the trust and safety of our customers, and we are putting the necessary processes and systems in place to stop anything like this from happening again.”
The company provided a tool to help users fix the issue but many customers had trouble recovering their systems, according to forum posts. Affected systems could be booted into safe mode or, in the worst case, the system only displayed a black screen and a mouse pointer after booting, according to one post.
In the future, the company will test its updates against a collection of virtual machines designed to replicate the most common configurations used by its customers. In addition, the company plans to increase its support staff and have a plan in place for phone support.
Anti-malware software has to walk a tight line. Software providers must blacklist malicious programs and be aggressive enough to catch as much malware as possible, but without designating good programs or services as malicious.
In March, the infection of an ad network’s home page led Google’s automated Safe Browsing system to identify the entire ad network as malicious, a designation that rippled out to every client and customer, leaving major Websites – such as ZDNet and The Guardian UK – with a malware alert when viewed by Google’s Chrome browser.
Whitelisting technology provider Bit9 – whose software allows companies to just allow known, legitimate programs – suffered the opposite situation, when attackers stole a digital certificate and signed their own malicious programs to pass them off as legitimate.
In the latest incident, Malwarebytes promised to work to improve the quality of its products and its process.
“We are building more redundancy to check our researchers’ work and improving our peer review,” the company’s CEO said.
What do you know about Internet security? Find out with our quiz!
Originally published on eWeek.
Welcome to Silicon UK: AI for Your Business Podcast. Today, we explore how AI can…
Japanese tech investment firm SoftBank promises to invest $100bn during Trump's second term to create…
Synopsys to work with start-up SiMa.ai on joint offering to help accelerate development of AI…
Start-up Basis raises $34m in Series A funding round for AI-powered accountancy agent to make…
Data analytics and AI start-up Databricks completes huge $10bn round from major venture capitalists as…
Congo files legal complaints against Apple in France, Belgium alleging company 'complicit' in laundering conflict…