rejetto / hfs2

web based file server
https://rejetto.com/hfs
GNU General Public License v3.0
620 stars 140 forks source link

HFS2 triggering a lot of false positives on VirusTotal #42

Open greatwolf opened 10 months ago

greatwolf commented 10 months ago

A recent scan is triggering 16 different AV: https://www.virustotal.com/gui/file/42d14f9efe83cd9d695d0796232bd6e12d276c1262b6cf39d31cfcf64e128f11/detection

image

Can anything be done about this?

rejetto commented 10 months ago

It seems that HFS has been used as tool inside malicious activities, so several AV are considering it a possible clue of such activity. They don't know/care that YOU downloaded it for YOUR purpose.

I guess that one possible thing to do is that people report it as a false risk.

btw, did you consider HFS3 ?

greatwolf commented 10 months ago

yea I'm currently trying HFS3 out too. I just don't like how much bigger it is compared to HFS2 because of the used of node.js

rejetto commented 10 months ago

I see. Just for sake of information, the server itself is 2.5 MB, of which more than half (1.5 MB) is the administration gui, the rest is node.

Ptit-Philou commented 4 months ago

I suggest to stop using HFS 2, as it can be easily hacked and you might loose your data and computer... I reported an issue, as my server has been attacked : I was lucky not to loose files and control. Just stop using HFS 2 : HFS 3 works fine, heaven if node.js is fat... :-)

DRSDavidSoft commented 4 months ago

@Ptit-Philou Same, I was lucky I didn't loose any files! Russian m****rs installed Keyloggers and RATs through HFS on two of my servers that were running HFS2. This could have ended much, much worse due to the fact that by default Windows Server comes with the Administrator account. I should have created a lower privilege account for HFS. Lesson learned the hard way! 😄

DRSDavidSoft commented 4 months ago

It appears the installed malware were a variety of these:

We're VERY lucky that the files weren't affected or damaged! Hopefully (at least as it appears) the hackers only resorted to install the RAT and these stealers on the server. We should ALL nuke the affected Windows machines and re-install everything from scratch. Backup everything.

Ptit-Philou commented 4 months ago

Not sure about Russia : it could come from Asia too... ;-)

DRSDavidSoft commented 4 months ago

I saw Chinese IPs in logs as well, but the successful infection is/was communicating with Russian-based web hosting. The attackers themselves might reside in other Cyrillic-speaking countries. In my experience, Chinese hackers usually use outdated/well-known attack vectors but Russian ones use bleeding edge exploits. 🤷🏻 Ah well, doesn't really matter where it came from, the important thing is that we were lucky that the files weren't damaged. We can always change leaked/compromised security keys and APIs later.