GameIndustry.eu Logo

2022 2014 2016 2019 2023 2017 2023 
GameIndustry.eu /  Blog /
English Malwarebytes lies and deliberately issues false/positive messages


Malwarebytes lies and deliberately issues false/positive messages

Published: 01.09.2019 Edited: 09.12.2024

Malwarebytes is a widely used anti-virus and anti-malware program from Malwarebytes Inc. The software includes an integrated mechanism that can assess the hosts file as malicious.

These misleading messages from malwarebytes refer to the presence of supposedly unauthorized versions where entries are present in the hosts file.


Does the fear of "product piracy" justify false reports?



In non-legally acquired and installed versions of Malwarebytes, the hosts file is modified with entries that aim to prevent activation servers from being contacted. A common method is the use of key generators, or auto-patchers that take care of all the work for users.

Depending on the situation, this mechanism can become problematic when consumers have a legal license but still find certain entries for Malwarebytes' activation servers in the hosts file. In this case, an immediate alert is triggered, the device's security is questioned, and the hosts files are automatically modified, even though everything is fine and there is no actual danger to the user.

Malwarebytes, Inc.'s software is an example of how those who declare security and rules first enforce their own interests.

Malwarebytes modifies hosts files automatically



Unsolicited modification of personal files and settings? Weakening of one's own security settings? False reports? This can happen quicker than expected, as this behavior is often seen in "snake oil" software and various "cleaners."

In addition to Wise Care 365 (german, not translated yet) and IObit, Malwarebytes also exhibits this behavior under certain circumstances. For example, the software deletes entries from its own hosts without feedback when certain entries are present, generates error messages about alleged threats, and tries to move the corresponding files to quarantine.

In addition to this behavior, users are also subjected to a telemetry service that is routed through Amazon's AWS (Elastic Compute Cloud) and tracks individual user actions, similar to the software from Avast S.R.O. (german, not translated yet).

Malwarebytes Telemetry



Intentional false reports by Malwarebytes



With the aggressive behavior of automatically modifying its own files, Malwarebytes also generates false reports that present users with a supposed threat scenario. Users who use filter lists containing entries for Keystone and Sirius are deliberately misled and confused.

Malwarebytes False Report

Unwanted elements? The only "unwanted" items here are those from the perspective of Malwarebytes, Inc.

Always Online doesn't work without internet



Another annoyance can occur when the internet connection doesn't work. A seemingly important error message immediately appears, suggesting that the user should check their own connection. However, it also shows that (if possible) a permanent online connection is available.

Malwarebytes without Internet



Summary and file attachments


  1. Keystone.txt, and Sirius.txt - The two addresses of Keystone and Sirius, which MUST NOT be in the hosts file, contain user data such as account ID, installation token, user IPv4 address, license key, timestamp of the last server contact, product version, product receipt date, license duration, subscription model, affiliate data, and more. Some of this data is, of course, necessary for registration verification.
    Sirius, on the other hand, is responsible for update routines.
  2. Scanlog_Riskware.txt - Scan log from Malwarebytes with the entries for Keystone and Sirius. Result: Riskware.DontStealOurSoftware.
  3. "Riskware.DontStealOurSoftware" indicates that the detected software, website, or file might contain features that could be misused, although these are not necessarily malicious.

  4. My-Device.txt - The address in this file contains the desktop ID of the user.
Keystone.txt (3.63 KB)
Date: 2025-01-29
CRC32 Hash: e4eefabf
SHA-256 Hash: f53d6aad25c9e1be341f1df67f816c04b91b4b9905adcf67108a7767aa05771b
Sirius.txt (5.29 KB)
Date: 2025-01-29
CRC32 Hash: bdb63610
SHA-256 Hash: 3026cb88d67684efb3f04fdcc8cfe23c70dd49d52ee0749e19d52f2a912e9ab6
Scanlog_Riskware.txt (1.6 KB)
Date: 2025-01-29
CRC32 Hash: ad25c391
SHA-256 Hash: 8d596651a636892272bea9cf0cc26b00f36111f64474072d41b5f6ff8f12386f
My-Device.txt (369 B)
Date: 2025-01-29
CRC32 Hash: 85cb2dd4
SHA-256 Hash: 2127b69527647b951832c7982650daf4976ffd6da07a8248430d7dae5a7fb90e

 

Your opinion is important – please leave a comment!

×

BB-Code Explanations

Here are the BB-Codes you can use:

  • [b] for bold text: [b]Text[/b] turns into Text
  • [i] for italic text: [i]Text[/i] turns into Text
  • [u] for underlined text: [u]Text[/u] turns into Text
  • [spoiler] for hidden Text: [spoiler]Hidden Text[/spoiler] turns into Hidden Text
  • [url] for hyperlinks: [url]http://example.com[/url] becomes a clickable link  
  • [url=link]text[/url] for named hyperlinks: [url=http://example.com]Visit me[/url] turns into Visit me  
  • [github] for GitHub links: [github]http://github.com/example[/github] turns into a  GitHub-Link

0 Comments