
Webroot upset many of its customers when one of its signature updates caused its anti-virus solution to flag critical Windows files as malicious.
The endpoint security provider’s anti-virus platform melted down between 13:00 and 15:00 MST on 24 April. In that time span, Webroot began detecting legitimate Windows files, some of which are essential for Microsoft’s operating system to function, as W32.Trojan.Gen, its generic name for a Windows trojan. The anti-virus platform responded by moving all these falsely flagged files into quarantine, rendering an untold number of computers inoperable.
Not too long after the update took effect, customers took to social media to voice their disbelief and share their stories.
And @webroot goes into meltdown. Hoping global restores will work. We have lot's of valid exe's for all types of software being flagged
— Dave Devery (@Davedevery) April 24, 2017
@Webroot everything is breaking, money is flying out the window… where are you? I have been on hold 20+min
— iSupportU (@isupportu) April 24, 2017
https://twitter.com/ericemoji/status/856621654537109504
Information security observer @SwiftonSecurity told Ars Technica that Webroot had falsely flagged “several hundred” files used by Windows Insider Preview at their place of work. Hundreds of “line of business” apps also went down as a result of the issue.
Strangely enough, Webroot even prevented users from accessing Facebook after it flagged the social network as a phishing site.

The flawed update was in place for 13 minutes before Webroot pulled it. Subsequently, the security firm released a workaround that users can implement to recover their files. This solution works for home users who have one or two affected PCs. But it doesn’t do much good for managed services providers (MSPs) that cater to hundreds or thousands of clients. For those clients, Webroot said in an update posted to its forums that it’s “still working to resolve this issue through the night and will keep you updated as soon as more information becomes available.”
That’s a small comfort to those affected by this incident. Still, it’s better than receiving a link to a slideshare about ransomware, something which Webroot sent to some of its users who complained.

All home users affected by Webroot’s snafu can reportedly fix the issue by uninstalling Webroot, restoring the quarantined files from a backup drive, and reinstalling the anti-virus platform. Let’s hope it doesn’t take long for the firm to release a solution for its business clients.
For more discussion around the issue, be sure to check out this edition of the “Smashing Security” podcast:
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
There's so much information out there in so many places about what's going on in the world of cybersecurity.
You need some experts to sift through it and find out what's important, what is trending, and deliver that information to you in a timely fashion.
Well, if you're interested in that, the latest information on the hackers, the exploits, the vulnerabilities, if you want that information delivered to you in a meaningful way every day, then sign up for the free Recorded Future Cyber Daily Newsletter.
All you have to do is go to recordedfuture.com/intel. That's recordedfuture.com/intel. And thanks very much to Recorded Future for sponsoring the show.
Smashing Security, Episode 18: Windows is a Virus, True or False? With Carole Theriault and Graham Cluley.
Hello, hello, and welcome to another episode of Smashing Security, episode 18. As always, I'm joined by my good buddy Carole Theriault. Hello, Carole, what have you been up to?
I was giving them a talk trying to get them to consider tech as a career path. Yeah, it was quite cool. Actually, a special shout out to Bernie, Sarah, and Zoe.
These are three girls from the school who did the latest Cyber First Girls competition, and they thought it was really great fun. So it was really cool meeting them.
Anyway, it was good, it was a really fun experience.
Sorry about that. And if you heard any other sound in the background, that is our special guest this week, Michael Hucks from PC Matic. How are things, Michael?
What we do is we all bring a story, something which has caught our attention in the last week, something which we thought was interesting from the world of computer security and hacking and malware and vulnerabilities and threats and data breaches and all of those sort of things.
There's an old joke, isn't there? There's this joke which goes around, which is that Windows, isn't that a virus? Isn't that malware? And people go, ha ha ha ha, very jolly.
Well, unfortunately, an antivirus product has made a bit of a clanger this week.
All of those computers, all of the computers relying on it, the companies, the organizations, the home users, it caused them serious issues.
What it was doing was it was misidentifying various essential Windows operating system files as W32.Trojan.Gen.
And, you know, it shoved them in the recycle bin and your computer obviously became unstable and wouldn't work properly. Any files digitally signed by Microsoft were whisked away.
Now, fortunately, you could reboot and you could restore the quarantined files, but it was causing mayhem.
And I saw one Twitter user, a guy called Bob Ripley, he tweeted, "I seem to have installed a nasty ransomware app. It's called Webroot. They've already got my money.
Should I contact the FBI?" And you can kind of understand the frustration. I mean, let's put our hands up here, right? We work in the antivirus industry or have done in the past.
And I think we've probably all worked for vendors where occasionally a small snafu might happen.
And obviously Webroot aren't having a great week this week and they've had bad experiences in the past.
In February, as The Register reports, they shafted corporate PCs in a separate instance, causing them to display the dreaded blue screen of death.
But this one has hit particularly badly, and it's affected all versions of Windows. It's also affected their managed service providers, other people who are using their engine.
And even though the update apparently was pulled after about 15 minutes, too late, the damage was done.
Because of course, the onus these days is on getting out those updates to protect people's computers as quickly as possible to protect against threats.
And somehow or another, this particular update clearly shouldn't have passed quality control, should it? It shouldn't have got out.
I mean, they are under severe stress, I bet, over there.
We know it's painful for corporate customers, the users affected by this kind of snafu, but it's also horrible for the people manning Webroot's tech support and managing their community forums.
And you know, I mean, you can imagine a customer—
So instead, you know, bottle your fury, vent it next time the sales guy comes around trying to sell you something, or you can negotiate a better deal or speak to the company execs and say, what are you going to do to make up for this disaster?
And how are you going to most importantly ensure that this never ever happens anything like this again? Because it's disastrous.
They have posted up on their support forums some methods by which people can protect the systems, but they're still working on exactly how to rectify this in the easiest way for everybody.
And clearly this is going to be something which is going to cause problems for some customers for a little bit of time until they've recovered.
It wasn't just that they were misidentifying some Windows LastPass files, there were also users on Twitter and on Webroot support forums saying, you know, this faulty update you've pushed out, it's also incorrectly blocking access to websites Facebook, saying that they're phishing websites.
So our users can no longer get onto Facebook. So to be honest, not all bad news then. Some good has come from this instead.
I can't imagine how that could work.
Oh, it was longer than that, but yeah. And it was where an update actually knocked out Sophos's own updating system, which meant that even though we had a fix—
They're getting it in the neck right now.
Of course, you have to answer to your bosses as well and explain why the computers are down.
And you know, there may be serious discussions which have to take place as to, you know, what you're going to do about that in future.
Michael, I hope you've got something more cheery for us.
I mean, everyone streams, but then of course you want to see it as quickly as possible and might you— I'm not sure, 'cause most TV shows come outta the States.
So if it was from a country outside the States, wanting an American show, maybe it's higher. Sorry, this is a very long answer I'm giving you.
A new study found that more than half of 53% specifically of all North American millennials regularly use pirate streaming services to watch TV shows and movies.
But you know, in the age of not wanting to wait for anything and instant gratification, if that thing is not there, they— it's very accessible to go and just grab something for free online.
And so most people are doing that.
Where you can, it's like Netflix, right? You can just stream a movie.
And I have encountered these sites where the movie might be released on DVD or something like that, and it isn't on Netflix yet. And you can just click and watch it.
But my preference would normally be to go to BBC iPlayer or to Netflix or Amazon Prime or something like that.
And I have trouble using it if I'm traveling, you know, because even though I'm a licensed user and licensed payer, I can't watch it when I physically am outside the country.
Some of these legitimate streaming sites, they do try and prevent the use of VPNs, which, you know, obviously runs contrary to what we would normally recommend in terms of security.
But of course, you know, when we are overseas, I've got a young child.
If I'm overseas and he wants to watch his favorite TV show, I would quite like to be able to log into iPlayer or one of the others and show it to him because I'm a licensed parent.
I'm a registered user of that particular site. I think those sites will begin to provide a mechanism for doing that.
And that's one thing you can see here across the board is it seems like the streaming services are kind of making it difficult for people to access the things they want, especially when that's what we're used to.
And when it comes to these things, if you're out you can't watch it if it's not on Netflix, but it's on Hulu or it's on Netflix in the UK but not in the US.
And you know, it's just there doesn't seem to be this perfectly aggregated program that's been made to do it.
And so when people are having a hard time finding what they want, they're two links down from that is an ad saying, well, here's you can watch it for free.
I watched that documentary called Tickled. Everyone out there, totally watch it. So yeah, and I think, Graham, you watched it, right?
So I obviously told Michael about it, and he can't it's not available for him on Netflix because they have a different version of Netflix for the UK and US, right?
And he doesn't have access to it yet.
Now, I imagine the reason why you're raising this issue, however, is not just because we care about the movie industry.
But because of the potential security implications, because—
And I wonder if most of the common people out there in the world who are just going around and looking for movies to watch, if they understand the security risk and the implications of using these sites.
What kind of things can happen to them? And I think that a lot of people don't really know.
They just think it's some kind of, wow, it's free and that's cool and nothing's really happening.
And not that I can see from at least, but do people understand that there are issues with this security risks?
Or, you know, I mean, it's a natural thing to do.
And just as we've seen, for instance, apps which have been malware infected and pirated and put up onto torrents, equally, there's no reason to think that a streaming site, an illegitimate streaming site, if we want to call it that, might attempt to trick you into installing something or have some booby-trapped, malformed Flash Player what's-it, just ready to infect your computer.
After all, they've already proven that they're not necessarily walking the right ethical line by making available these movies which they don't necessarily have permission for anyway, right?
So they're already a little bit gray.
And if someone goes on the internet, they say, can I watch, you know, The Big Lebowski for free? And there's a link right at the top and it says, yeah, hop right in.
Do they necessarily know that they're even doing something wrong? I mean, a lot of these sites are very professionally done.
They have great search cues and you can just go through and find whatever you want. They don't— they look legitimate, a lot of them.
Okay, so say someone absolutely must stream something from a site that— whether we're going to say we're assuming it's legal and they have to stream some sort of a site they do not know and therefore can't trust.
That's what we can focus on. What would you suggest? I'd suggest don't register with it. You know, have a throwaway email account if you have to register on it would be one.
First of all, you know, let's question that. Is there anything you've absolutely really got to watch? Yes, definitely.
But if you absolutely do have to watch something for some reason, then you might be an awful lot safer maybe using an iOS device.
So using your iPhone or your iPad rather than Android or using Windows.
And be very wary of any site which asks you to register or give the email address. And if you are going to do that, give them a throwaway email address instead.
Don't give them your personal information in order to watch the movie.
I mean, people have been charged and ordered to pay upwards of, you know, over half a million dollars for illegally downloading 30 songs. I looked at one today that—
I mean, I think we just have to be aware that if, you know, they go after you, it's big bucks.
From the Flanders Paradise.
Now we can't tell you how many people that actually represents because a lot of the female registrants, if you remember, were found out to be actually bots.
But I remember, and Gizmodo, and you know, high five to Gizmodo because they did that research and it was awesome. It was a great report.
So a lot of people were affected. Now, why did they get hacked?
The goal was to shut down this site because it was for moralistic reasons of, you know, the fact that they destroyed families and the rest.
However, the threat was, we're going to publish the identities of all the registered users regardless of whether they use the services or not.
So of course, we all know what happened. Ashley Madison did not shut down. Impact Team did publish the data on the darkweb, and as we remember, the media went bananas.
Now, there were obviously horrific consequences. I think there were two suicides in Toronto, and there was a few down south, I think New Orleans.
There was a few suicides down there as well. So yeah, this is a few years ago, right? So you think that's, you know, everyone's forgotten that story. That happened two years ago.
Why am I talking about it today? Well, a blackmail campaign has just been launched, and it's using the data from this dump.
So, on May 1st, 2017, we are launching our new site, Cheaters Gallery, exposing those who cheat and destroy families.
We will launch the site with a big email to all the friends and families of cheaters taken from Facebook, LinkedIn, and other social sites.
They will include you if you do not pay to opt out.
Do you pay up and hope that it keeps a lid on everything? Or do you just tell them to fuck themselves?
So that big email, you know, who knows what that's gonna include.
You don't want them to focus any more attention on you.
And it's like, you clearly don't want this information to leak out, so I'm gonna try and get more money out of you. So don't give in to blackmailers.
I mean, what stops them from doing this over and over and over and over until they either wipe you completely clean or just you decide not to pay, but you've already paid 10 times.
So, okay, they're saying they're going to create this site, Cheaters Gallery.
And there have been other attempts to blackmail them in the past.
I've received emails and people have forwarded me letters which they've received because they were members of Ashley Madison.
I mean, maybe a few got through because they deleted the email or I don't know, somehow was able to hide away from it.
What have they got to gain from going through that entire database and scouring Facebook and LinkedIn and trying to work out who your partners are and who your family members are, and then try and reach them as well?
That's an awful lot of effort to go to, and you're not going to make any money out of it.
And I think there's the extra gravy, if you want, of embarrassment by saying we're going to go after, you know, your loved ones and tell them what you've done.
And you're suggesting, of course, they're not going to do that. That's going to be a lot of work.
Blackmailer, because there's already plenty of websites where you can enter people's names and see if they occur in the Ashley Madison database.
And furthermore, Ashley Madison never bothered to verify people's email addresses. So you could put in, and I believe, for instance, Tony Blair's email address, right?
Former Prime Minister of Great Britain. His email address was in the Ashley Madison database dump. But I don't think he was cheating on Cherie. No. Right?
And I'm sure in other cases, that's the story you're using. Right. To try and—
Check out a service like, for example, Troy Hunt's excellent service, Have I Been Pwned?
And you can put in your email address at that location to see safely whether you're on any of these lists and where you might have— your name may have been found, your email address and some of your data.
If you're going to sign up, it doesn't matter if it's an adultery— I mean, Ashley Madison sold itself and marketed itself a great deal as, you know, having an affair and all that kind of business, right?
But even if it isn't that kind of site, even if it's just a regular dating site, if you're signing up for it tomorrow, be careful what details you give it and what email address and so forth you might give it, because in 15 years' time, when you are in a healthy relationship and that site gets hacked and your information comes out, your then current partner may think, "Well, what are you doing as a member of that site?" And you'll be there saying, "Well, I joined it 15 years ago." Okay.
Right?
Now, obviously, some have PayPal and some have other methods of payment, which can be better to protect your anonymity should the worst happen.
But you know, they do need to, a lot of these sites demand that you kind of provide legitimate credentials before you go forward.
And I think we're all agreed, don't pay the blackmailers, right?
Because if everyone didn't pay, if the payback was low, then wouldn't the criminals kind of go, ooh, that didn't work, maybe we should do something else, that data's dead. Right?
In fact, I would say go one step further and report the blackmail extortion attempt to the authorities because it may well be that they are investigating the case and that they need evidence.
That's a good point.
If you enjoyed the show, make sure to subscribe to us on iTunes or on Google Play Music or Stitcher or TuneIn or Overcast.
You can sign up to their Cyber Daily newsletter and get their latest insights at recordedfuture.com/intel.
You can go to www.smashingsecurity.com and you will find an email contact form and a link to our Twitter and all the other places where we hang out online.
And until next week, toodaloo, bye-bye, bye, au revoir.
Update: Mike Malloy of Webroot has offered the following statement:
Webroot has issued a standalone repair utility that provides a streamlined fix for our business customers. This is in addition to the manual fix issued Monday, April 24.
For access to the repair utility, business customers should open a ticket with Webroot support, or reply to an existing support ticket related to this issue.
The instructions we shared with our consumer customers yesterday are still the best solution for these users.
Our entire Webroot team has been working around-the-clock on this repair and is implementing additional safeguards to prevent this from happening in the future. We apologize to our customers affected and appreciate their patience during this challenging issue.

Strangely enough, Webroot even prevented users from accessing Facebook after it flagged the social network as a phishing site.
What's so strange?
I've been using Macs for >2 decades. Been running Sophos for years and years, but it never finds anything.
Given how often Windows throws a 'Unknown Publisher' modal alert for Windows own code, I'm surprised this sort of behavior isn't a daily way of life for PC's.
For ITs, it looks like nightmare at is best!…at least Webroot didn't flag itself as a threat…:)
Mental note: check antivirus test result reports (AV-comparatives dot org): does Webroot AV feature in the very good, okay, or mediocre category?
[why are all these business users and MSPs choose Webroot? – it has never featured on my business AV option list, never mind shortlist..]
Webroot will surely lose a lot of customers over this.. And I don't mean blocking of Facebook, which would appear advantageous to most business outside of some with sole web presence there..
Almost all antivirus products do something bad from time to time, but this is a so big.. (far bigger than McAfee hiding all a client's user files under Windows 8.1 pro in 2016. That resolved by uninstalling McAfee and installing a reliable product instead.)
I am fighting right now with a similar problem in Windows 7 Prof due to Kaspersky Internet Security., which I have had only 2 weeks. It suddenly started flagging eclipse JARs as "corrupt" (they weren't): Now, instead of that, it flags the 64-bit Java (8u131, the latest Oracle version) as "incompatible 16-.bit version" that I use to start eclipse.
A month ago I paid for a 3-machine Bitdefender product that I finally deinstalled, because it was preventing my machine from shutting down, and then strangely started fiddling around with my task bar (icons and size became different). Now I have these Kaspersky problems.
In between giving all these guys a chance to clean up their act, I deinstall their software and reinstall Microsoft Security Essentials, which I've been using to my satisfaction for years.
This story about Webroot has really made me sweat. Looks like I'll have to spend a lot of money short-term on a fast backup system that I should use daily – I have a lot of changing development data. Gotta go into AAV (anti-antivirus) mode.
What I cannot understand is why Webroot failed to test their own signatures on Windows PCs BEFORE distributing them! I have been using Webroot for 3 years now and even have it in our business because I personally recommended it. The only problem I have ever had with it is with an esoteric MIDI sequencer called Seq303. I reported the false positive to them, and they still have done nothing about it. I run Windows 10 Defender instead on that particular PC running Seq303.
That said, Webroot is the least intrusive, lightest resource usage, and easily most effective AV product I have ever used. It spotted viruses Kaspersky failed to spot. And it has heuristic analysis built in for zero-days. It is still excellent IMO, despite this wobble!
And I have installed Kapsersky products on Client computers that were infected when Webroot failed to detect an infection on their computers.