Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

v1.6.2 is showing viruses/trojans by several virus scanners #277

Open
signal15 opened this issue Jul 10, 2017 · 58 comments
Open

v1.6.2 is showing viruses/trojans by several virus scanners #277

signal15 opened this issue Jul 10, 2017 · 58 comments

Comments

@signal15
Copy link

signal15 commented Jul 10, 2017

15/58 virus scanners are showing malware in this package. In v1.6, they also showed 5/58. Something shady is going on with this package. See virus scanning results here:

https://www.virustotal.com/en/file/fed08bd733b8e60b5805007bd01a7bf0d0b1993059bbe319d1179facc6b73361/analysis/1498759251/

Some of these look like they are specifically detecting rdpwrap, but some look like they are detecting WisdomEyes and other malware.

Also, the latest version of Chrome on Windows refuses to download v1.6.1 saying that it is "dangerous". It does download v1.6 just fine though.

@binarymaster
Copy link
Member

Well, maybe if I change the behaviour of installer not to enable RDP by default after installation, it will be more secure, and those AVs would be more quiet.

@da2x
Copy link

da2x commented Jul 10, 2017

It’s the behavior of the installer that is triggering the problem. The installer is a newly installed program that goes and download an INI or DLL, right? (Or anything over TLS.) Well, that is malicious behavior (at least that is how antivirus vendors see it). Digitally sign the installer with a code signing certificate. Then you can contact reach antivirus vendor individually and request that your signature is added to a whitelist.

Alternatively: don’t download stuff off the web right away. Do auto-update like behavior and wait a week before you start downloading resources. This require that everything is bundled in the installer, however.

@signal15
Copy link
Author

Why not just package the DLLs/INIs with the installer instead of having them downloaded when the installer is run?

In any case, I cannot even get v1.6.1 to download via Chrome, and if I download with another browser, our corporate AV solution flags it and deletes it, and then a ticket gets opened and an investigation is launched. I can have them whitelist the hash, but that would require at least a couple of hours of someone's time to verify in a sandbox that the tool is safe. I'm sure many others are facing the same issues as I am.

@binarymaster
Copy link
Member

Why not just package the DLLs/INIs with the installer instead of having them downloaded when the installer is run?

They are already built-in. Online installation is optional feature and controlled by command-line arguments.

@signal15
Copy link
Author

If you made enabling RDP a checkbox option, I wonder if that would get around some of it as well.

@The1andONLYdave
Copy link

The1andONLYdave commented Jul 19, 2017

//edit:nvm, sorry for triggering notifications - i totally missed that it is mentioned in the last sentence of the first post.

Also flagged by Current Stable Chome on Windows as malware/malicious download. Maybe you can file a
request here https://support.google.com/webmasters/answer/3258249?hl=en

@da2x
Copy link

da2x commented Jul 19, 2017

(There are no exception for unsigned programs … it’s the certificate that is excluded not the software.)

@psommerfeld
Copy link

Any update on this? Chrome is still blocking the download.

@maxim
Copy link

maxim commented Sep 28, 2017

In chrome after download refuses to start click the "Show All" and there click "keep anyway".

@goozleology
Copy link

So, when downloading 1.6.1, Chrome blocked it. However, I went to Settings >> Downloads and was able to get Chrome to download it. However, when I tried to install it, my Malware detector, Bitdefender, also blocked it. Can you confirm that the download and install is safe?

@binarymaster
Copy link
Member

binarymaster commented Oct 4, 2017

Can you confirm that the download and install is safe?

How I can do it? It's a matter of trust, since you're downloading it from official repo ( https://github.com/stascorp/rdpwrap/releases ).

If you don't trust the binaries, you'll need to build it from source. If you don't trust the code, I don't know how to help you.

@affinityv
Copy link

@binarymaster you can provide a sha256sum or better still, you can provide a .sig file using a GPG key? And provide your GPG key's fingerprint for verification. There are still trust issues, but if you establish a good reputation with a GPG key, then it can be very much worthwhile. You can also create an account as keybase.io and verify your Github account through that, as well as verify your GPG key; then provide details of your fully verified keybase.io account.

@affinityv
Copy link

@binarymaster you can provide a sha256sum or better still, you can provide a .sig file using a GPG key? And provide your GPG key's fingerprint for verification. There are still trust issues, but if you establish a good reputation with a GPG key, then it can be very much worthwhile. You can also create an account at keybase.io and verify your Github account through that, as well as verify your GPG key; then provide details of your fully verified keybase.io account.

@distinguished-git
Copy link

Are you having trouble with GPG?

Or maybe you are worry that taking rdpwrap off the malware list will make you a riper target for the M$ legal department?

@stascorp stascorp deleted a comment from JebonLebong Dec 15, 2017
@binarymaster
Copy link
Member

@distinguished-git unfortunately I have no free time to work on that.

@binarymaster binarymaster changed the title v1.6.1 is showing viruses/trojans by several virus scanners v1.6.2 is showing viruses/trojans by several virus scanners Dec 28, 2017
@BigMikeC
Copy link

The latest version has triggered even more virus alerts on Total Virus. It has now risen from 15 to 19 with some of the most commonly installed AV suites blocking RDP Wrapper including, as said above, Google Chrome. It is a superb utility and we need to assist binarymaster in getting it in a format that does not trigger such serious trojan and malware warnings.

@binarymaster
Copy link
Member

Just for curiosity's sake I rechecked all binaries in release, here are results:

@BigMikeC
Copy link

BigMikeC commented Jan 3, 2018

The problem is! Binarymaster, is that those 18 anti malware scanners are amongst the most popular products and it leaves a huge number of users unable to install the files or try to create a quarantine exceptuin

@binarymaster
Copy link
Member

huge number of users unable to install the files or try to create a quarantine exception

Since the project is targeted at system administrators and experienced users, this is not so huge.

@YisroelTech
Copy link

Honestly, what people concerned about this can do is report the detection to the AV vendors as false positives. Here is my pretty successful try with Kaspersky (that I'm using personally as AV):
img_20180104_010746

@asulwer
Copy link

asulwer commented Jan 8, 2018

I think the issue is the virus scanners you are using. Where is the virus binarymaster snuck in? go look at the source code that he has kindly provided and show it to me! most of the complainers are just trying to get hits on the search engines so people will stop using this. who do these complainers work for? Microsoft or an affiliate? I have personally downloaded and compiled the source, which is how I am using this package. if you are concerned then do it that way. binarymaster is not getting paid!

@YisroelTech
Copy link

@asulwer, stop accusing people as working for someone etc...

People aren't "complaining" they are just "asking" if there's a possibility to have this assume tool being more easy to use for the layman who isn't proficient in excluding or bypassing their AV.

But as binarymaster correctly pointed out, this project is targeted for experienced users and it'll take too long for him to work on this issue.

But the community can certainly try to help by reporting this as a False Positive to the AV vendors.

@BigMikeC
Copy link

BigMikeC commented Jan 8, 2018

To confirm what Asulwer just stated. Nobody is complaining and we all agree its a superb utility. We also all agree that the Virus scanners (18 out of 66 of them) are being far too sensitive to some aspect of the program and generating a false positive. Those 18 are some of the main anti-virus programs. The idea is to see if we can assist by either flagging it as false positive with each individual software provider or helping with another apsect in the coding or dll's.

@EliezerBee
Copy link

EliezerBee commented Jan 19, 2023

Bitdefender flagged 5 files:

  1. S:\ALL DATA\Eliezer\Downloads\RDPWInst-v1.6.2.msi
  2. S:\ALL DATA\Eliezer\Downloads\RDPWrap-v1.6.2.zip
  3. C:\Program Files\RDP Wrapper\rdpwrap.dll
  4. C:\Windows\Installer\2d0161.msi=>(Embedded CAB)=>RDPWInst
  5. C:\ProgramData\Package Cache\{37ea5771-3352-4a52-9fac-9297331daebd}\RDPWInst.exe

I easily whitelisted the first 3.
But the 4th and 5th don't have a clear name or predictable path with which to whitelist. How can I whitelist those?

And it categorized all those files like this:
threatType="6" threatName="Application.RemoteAdmin.RHU"

@cowwoc
Copy link

cowwoc commented Jan 19, 2023

@EliezerBee You'll need to add a parent directory to the exclusion list. Added folders exclude all nested files and directories.

@EliezerBee
Copy link

I would be afraid to just whitelist these:

  • C:\Windows\Installer\
  • C:\ProgramData\Package Cache\

essentially saying any malware that deposited files anywhere therein have a green light. Wouldn't you agree that's highly risky?
I'm trying to find out if Bitdefender supports wildcards.

@cowwoc
Copy link

cowwoc commented Jan 19, 2023

Are you trying to automate the install process? If so, run a script that finds the exact absolute path and whitelist only that. If you're not automating, do this work by hand and whitelist the full path again.

@EliezerBee
Copy link

No, I'm not trying to script or automate anything. I'm simply trying to whitelist RDPWrap on one computer so that Bitdefender doesn't attack RDPWrap with every scan.

It deleted the files from these two locations:

  • C:\Windows\Installer\2d0161.msi=>(Embedded CAB)=>RDPWInst
  • C:\ProgramData\Package Cache{37ea5771-3352-4a52-9fac-9297331daebd}\RDPWInst.exe

I had trouble manually copying the files back there, due to permissions. Should I change the permissions and copy the files back there?

Are these even valid paths ("2d0161" and "{37ea...}") for me to whitelist?

@cowwoc
Copy link

cowwoc commented Jan 20, 2023

Honestly, I don't know. I'm just an end-user and I also don't use Windows Defender so I've never actually run into the problem you mentioned.

This problem is not specific to this project. I recommend looking for help on Google or Youtube. Other people must have the same problem.

@EliezerBee
Copy link

Understood, and you're correct.
But just for the record, I'm not asking about Windows Defender. I'm asking about Bitdefender free.

@EliezerBee
Copy link

Well, maybe if I change the behaviour of installer not to enable RDP by default after installation, it will be more secure, and those AVs would be more quiet.

This would be a great idea, actually. That's easy enough to document and for users of RDPWrap to do. And it would make people calmer since every AV wouldn't be alarming.

@ntlug
Copy link

ntlug commented Jan 23, 2023

While I do not speak for Microsoft, this was a very active targeted detection by Microsoft and they raised (falsely) the detection to the highest level. So, you can try to hide, just realize that Microsoft is targeting this. With that said, they had to go "out of their way" a bit to make it so. In other words, it took some effort for Microsoft to do this work. My guess is that other AVs are merely following... (I mean, you wouldn't want to be the one AV that doesn't detect a very high level (highest) security problem).

@EliezerBee
Copy link

OK, let's say it's Microsoft targeting RDPWrap. But most RDPWrap users are also running AV solutions. So why not put everyone at ease by making the small change of not enabling RDP as part of the installation? If we could eliminate all the alarming AVs, RDPWrap users will be happier.

@ntlug
Copy link

ntlug commented Jan 23, 2023

My point is, the problem isn't necessarily going to "go away", as Microsoft has RDPWrap (specifically) in its sites. They'd love to dismantle all others as well, but the big #1, if all else fails, is to ensure that RDPWrap is stopped, by force or by "implied" force by scaring the pants off the end user. The "trickier" that RDPWrap becomes, sadly, means the more "virus like" it may appear.... but I'm not the developer. Would welcome a return to what "was"... just not sure it's possible.

@jimboat63
Copy link

jimboat63 commented Oct 18, 2023

Malware bytes still showing virus detected. So, is this file infected or safe?

@ChaseKnowlden
Copy link

RDPWInst.exe: 48/72

@sashaqwert sashaqwert mentioned this issue Apr 17, 2024
@sashaqwert
Copy link

sashaqwert commented Apr 24, 2024

WARNING

RU: Если вы видите rdpwrap.ini, в котором в конце даты обновления стоит буква b, то этот INI активирует бекдор (требуется проверить!) Если буква a, то бекдор полностью отключается (требуется проверить). Я не гарантирую истиность.

EN: If you see rdpwrap.ini with the letter b at the end of the update date, then this INI activates the backdoor (needs to be checked!) If the letter is a, then the backdoor is completely disabled (needs to be checked). I do not guarantee the truth.

@affinityv
Copy link

WARNING

RU: Если вы видите rdpwrap.ini, в котором в конце даты обновления стоит буква b, то этот INI активирует бекдор (требуется проверить!) Если буква a, то бекдор полностью отключается (требуется проверить).

EN: If you see rdpwrap.ini with the letter b at the end of the update date, then this INI activates the backdoor (needs to be checked!) If the letter is a, then the backdoor is completely disabled (needs to be checked).

What absolute nonsense!

@leoli-dev
Copy link

The app stopped working after installing Bitdefender, and the antivirus application keeps blocking me from downloading a new one. I can't find any option to bypass this restriction.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests