rejetto / hfs2

web based file server
https://rejetto.com/hfs
GNU General Public License v3.0
601 stars 131 forks source link

HFS2 triggering a lot of false positives on VirusTotal #42

Open greatwolf opened 6 months ago

greatwolf commented 6 months ago

A recent scan is triggering 16 different AV: https://www.virustotal.com/gui/file/42d14f9efe83cd9d695d0796232bd6e12d276c1262b6cf39d31cfcf64e128f11/detection

image

Can anything be done about this?

rejetto commented 6 months ago

It seems that HFS has been used as tool inside malicious activities, so several AV are considering it a possible clue of such activity. They don't know/care that YOU downloaded it for YOUR purpose.

I guess that one possible thing to do is that people report it as a false risk.

btw, did you consider HFS3 ?

greatwolf commented 6 months ago

yea I'm currently trying HFS3 out too. I just don't like how much bigger it is compared to HFS2 because of the used of node.js

rejetto commented 6 months ago

I see. Just for sake of information, the server itself is 2.5 MB, of which more than half (1.5 MB) is the administration gui, the rest is node.

Ptit-Philou commented 1 week ago

I suggest to stop using HFS 2, as it can be easily hacked and you might loose your data and computer... I reported an issue, as my server has been attacked : I was lucky not to loose files and control. Just stop using HFS 2 : HFS 3 works fine, heaven if node.js is fat... :-)

DRSDavidSoft commented 1 week ago

@Ptit-Philou Same, I was lucky I didn't loose any files! Russian m****rs installed Keyloggers and RATs through HFS on two of my servers that were running HFS2. This could have ended much, much worse due to the fact that by default Windows Server comes with the Administrator account. I should have created a lower privilege account for HFS. Lesson learned the hard way! 😄

DRSDavidSoft commented 1 week ago

It appears the installed malware were a variety of these:

We're VERY lucky that the files weren't affected or damaged! Hopefully (at least as it appears) the hackers only resorted to install the RAT and these stealers on the server. We should ALL nuke the affected Windows machines and re-install everything from scratch. Backup everything.

Ptit-Philou commented 1 week ago

Not sure about Russia : it could come from Asia too... ;-)

DRSDavidSoft commented 1 week ago

I saw Chinese IPs in logs as well, but the successful infection is/was communicating with Russian-based web hosting. The attackers themselves might reside in other Cyrillic-speaking countries. In my experience, Chinese hackers usually use outdated/well-known attack vectors but Russian ones use bleeding edge exploits. 🤷🏻 Ah well, doesn't really matter where it came from, the important thing is that we were lucky that the files weren't damaged. We can always change leaked/compromised security keys and APIs later.