--
You received this message because you are subscribed to the Google Groups "innosetup" group.
To unsubscribe from this group and stop receiving emails from it, send an email to innosetup+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/innosetup/02234850-8cce-4404-97bb-1cfcda0b0f0dn%40googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/innosetup/1fca59ba-a4fc-4405-844d-4c208d987f09n%40googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/innosetup/b05817cd-87b7-4e64-b711-d977b7c7a835n%40googlegroups.com.
I have a dedicated FTP login provided by Avast where I upload my signed executables. They then whitelist them and email me confirmation.
Search for Avast “whitelist”. This also covers AVG.
Andrew
Sent from Mail for Windows 10
From: 'P S' via innosetup
Sent: 10 January 2021 15:34
To: innosetup
Subject: Re: Entire site taken down by 'malware attack' in Innosetup installer
I certainly can report it but to whom? VirusTotal? Even if I do, do you think they will pay any attention whatever to me? And in the many months that it takes them to figure it out - if they ever do - I will still be unable to publish my software - so I still have no choice but to publish it via another means.
Will signing the software prevent it from being detected? It won't change what the installer actually does internally.
On Sunday, 10 January 2021 at 15:14:45 UTC truc...@gmail.com wrote:
And, to sign your software.
On Sunday, 10 January 2021 at 12:38:30 UTC Ath wrote:
A more helpful approach could be to report a false positive to the involved AV suppliers, as they haven't done their homework properly.
Op za 9 jan. 2021 om 21:10 schreef 'P S' via innosetup <inno...@googlegroups.com>:
I meant to add that the installer isn't codesigned but I checked it and it is identical to the one created by the original Innosetup build. There is also no indication that any of my systems or that of my webhoster is compromised.
It simply looks like there are things that the installer does that the scanners now decide are suspicious. Unfortunately we would expect copying and 'dropping' files is exactly what an installer would be expected to do... it's not Innosetup's fault but as it stands I can see more and more people will not be able to host Innosetup installers on their websites because VirusTotal will start flagging them. As it is right now, I will have to find a new installer software that doesn't trigger VirusTotal or I will need to stop distributing my software :(
On Saturday, 9 January 2021 at 20:03:48 UTC P S wrote:
Hi
Funnily enough, it is VirusTotal that flagged the installer via an outfit called 'netcraft' that checks websites for vulnerabilities.
VirusTotal claims 3 out of 70 scanners flagged the installer with the four triggers I listed earlier. No other local scanners on my side or on my webhosters side found anything suspicious.
On Saturday, 9 January 2021 at 04:20:15 UTC eivind.b...@gmail.com wrote:
What results do you get when you upload your suspicious installer to be tested in eg virustotal.com?
Do you create codesigned installers (making them tamper proof)?
You'll find in this group that IS installers are often triggering false positives... but that's not a guarantee that your installer is a false positive.
On Fri, Jan 8, 2021 at 11:15 PM 'P S' via innosetup <inno...@googlegroups.com> wrote:
Just to add, I have been using Inno Setup for nearly 20 years (and it's great!) but this is the first time I've had an issue like this..
On Friday, 8 January 2021 at 13:10:14 UTC P S wrote:
I just received a message from my web hoster that my entire web account (account, sites, email, everything) has been suspended because of an innosetup installer I have (one I built in October 2020) - has been detected as being the cause of an 'ongoing malware attack'
It looks like a false positive but this is clearly an issue...
The report talks about these 'suspicious' things found within the installer exe
> Executes dropped EXE
> Loads dropped DLL
> Suspicious behavior: GetForegroundWindowSpam
> Suspicious use of WriteProcessMemory
Anybody else getting this issue?
--
You received this message because you are subscribed to the Google Groups "innosetup" group.
To unsubscribe from this group and stop receiving emails from it, send an email to innosetup+...@googlegroups.com
To view this discussion on the web visit https://groups.google.com/d/msgid/innosetup/02234850-8cce-4404-97bb-1cfcda0b0f0dn%40googlegroups.com.
--
You received this message because you are subscribed to the Google Groups "innosetup" group.
To unsubscribe from this group and stop receiving emails from it, send an email to innosetup+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/innosetup/1fca59ba-a4fc-4405-844d-4c208d987f09n%40googlegroups.com.
--
You received this message because you are subscribed to a topic in the Google Groups "innosetup" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/innosetup/2w9y182pRmM/unsubscribe.
To unsubscribe from this group and all its topics, send an email to innosetup+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/innosetup/b05817cd-87b7-4e64-b711-d977b7c7a835n%40googlegroups.com.
Yes, unfortunately it looks like VirusTotal engines that are complaining work by executing the installer inside a virtual sandbox and monitor its windows API usage, so wrapping it up won't prevent the detection. There's not an easy way around this one.
To view this discussion on the web visit https://groups.google.com/d/msgid/innosetup/bf56b614-a052-422b-b98f-8e32089febd8n%40googlegroups.com.
--
You received this message because you are subscribed to a topic in the Google Groups "innosetup" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/innosetup/2w9y182pRmM/unsubscribe.
To unsubscribe from this group and all its topics, send an email to innosetup+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/innosetup/3b109bdc-9c30-4f29-819d-e4536df1475bn%40googlegroups.com.
Gavin; yes, I had a long debate with my webhoster to get my account reinstated, but they won't allow the installer to be hosted because their flagging and suspension system is automatic and handled by a third party. So my choice is to change webhoster or installer... changing webhoster is a major pain as I'm sure everybody knows.
My point. and the point of getting in touch here, is that in general if Innosetup is increasingly getting flagged in this way it might behove the developers to look at ways to prevent these false positives from happening by altering their code... It's not their fault, but the sad truth is that, just like we as developers have to modify our code to workaround OS bugs that aren't our fault all the time, the Innosetup guys can't fight the tide and ultimately they will begin to loose customers because the customers will choose the path of least resistance and change installer... which I'm sure none of us want.
I'm in the same boat. Each new installer generates CrowdStrike alert and our securities pushing us to switch as they say not only CrowdStrike but also McAfee and Mimecast detects installers packaged with InnoSetup as 100% threat.
When I run Inno Setup's own signed installer (innosetup-6.1.2.exe) through VirusTotal, it reports only 1 detection -- something called "CRDF"
--
You received this message because you are subscribed to the Google Groups "innosetup" group.
To unsubscribe from this group and stop receiving emails from it, send an email to innosetup+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/innosetup/4eeae59c-ff79-40d8-94cc-e9b34b71dd13n%40googlegroups.com.