HelpSites

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, November 3, 2009

IObit Cached Page

Posted on 1:30 PM by Unknown
Copy/Paste from http://cc.bingj.com/cache.aspx?q=%22http+forums+iobit+com+showthread+php+t+3325%22&d=4975839906562687&mkt=en-US&setlang=en-US&w=cef7093a,c4461288

You have reached the cached page for http://forums.iobit.com/showthread.php?t=3325
Below is a snapshot of the Web page as it appeared on 10/28/2009 (the last time our crawler visited it). This is the version of the page that was used for ranking your search results. The page may have changed since we last cached it. To see what might have changed (without the highlights), go to the current page.
Bing is not responsible for the content of this page.
IObit Security 360 Free Download | Advanced SystemCare Free Download

Go Back
IObit.Com Forums > IObit Security 360 > False Positives Report
Reload this Page False Positive Report
FAQ Members List Calendar Mark Forums Read



Thread Tools
Old 07-18-2009, 07:42 PM
mafia87 mafia87 is offline
Junior Member

Join Date: Jul 2009
Posts: 1
Default False Positive Report

The files listed here is all key generator or cracks.... None of it are virus, trojan etc...

IObit Security 360

OS:Windows 7
Version:0.2.0.67
Define Version:1057
Time:18/07/2009 19:34:54

|Name|Type|Description|ID|
Dont.Steal.Our.Software.A, File, G:\Nothing Much\Anti-Spyware\Malwarebytes' Anti-Malware v1.39\Key_Generator.exe, 9-30501
Trojan.Agent, File, G:\Nothing Much\Anti-Spyware\PC Tools Spyware Doctor v6.0.1.445\Linezer0\nfoviewer.exe, 9-11778
Malware.Tool, File, G:\Nothing Much\SYSTEM Tools\WinRAR v3.80\Patches\RAR Slayer v1.1 [Patch]\RAR Slayer v1.1.exe, 9-44067
Trojan.Dropper, File, G:\Nothing Much\SYSTEM Tools\WinRAR v3.80\Patches\WinRAR v3.80 REAL Keygen Only-FFF\Keygen.exe, 9-3767
PuP.Keylogger, File, G:\Nothing Much\Downloaders-Uploaders\File Hosting Tools\CryptLoad v1.1.8\router\FRITZ!Box\nc.exe, 9-33356
Unwanted.Driver Checker, File, G:\Nothing Much\Drivers\Driver Checker v2.7.3\DriverChecker_Setup.exe, 8-661
Malware.Tool, File, G:\Nothing Much\SYSTEM Tools\EVEREST Ultimate Edition v5.02.1750 Final - Multilingual\Lavalys.EVEREST.Ultimate.Edition.v5.0 2.1750.Multilingual.Incl.Keymaker-ZWT\keygen.exe, 8-303
Dont.Steal.Our.Software.A, File, G:\Nothing Much\Anti-Spyware\Malwarebytes' Anti-Malware v1.39\Malwarebytes.Anti-Malware.v1.37.Multilingual.Win2kXP2k3Vista.Incl.Ke ygen-CRD\yaya.exe, 11-7371
Spyware.Banker, File, G:\Nothing Much\Cracking Tools\Genuine Advantage Validation Office & Windows\Microsoft Genuine Advantage - Integrated Crack (WGA-OGA)\MGA_crack.exe, 11-8802
Spyware.Banker, File, G:\Nothing Much\Cracking Tools\Genuine Advantage Validation Office & Windows\Office Genuine Advantage (OGA) v1.7.111.0\OGA_v1.7.111.0_crack.exe, 11-8802
Spyware.Banker, File, G:\Nothing Much\Cracking Tools\Genuine Advantage Validation Office & Windows\Windows Genuine Advantage (WGA) v1.9.40.0\WGA_v1.9.40.0_crack.exe, 11-8802
Misleading.Installer, File, G:\Nothing Much\MultiMedia\Subtitle Tools\SubTitling Tools AIO - 2009\SubTitling Tools AIO - 2009 - www.cyberwarez.info by Freak.exe, 11-9962
Malware.Packer, File, G:\Nothing Much\SYSTEM Tools\EVEREST Ultimate Edition v5.02.1750 Final - Multilingual\EVEREST Ultimate Edition v5.02.1750.WinAll_Keygen_SND\tiny.nfo.viewer.exe, 11-1
Spyware.Banker, File, G:\Nothing Much\Cracking Tools\Windows Activators\Windows 7\Windows 7 Activation With OEM Information v1.0\Windows7Activation.exe, 11-8802
Spyware.Banker, File, G:\Nothing Much\Cracking Tools\Windows Activators\Windows Vista\Slic - OEM's Logo Information Installer 0.0.0.1\Slic - OEM's Logo Information Installer 0.0.0.1.exe, 11-8802
Spyware.Banker, File, G:\Nothing Much\Cracking Tools\Windows Activators\Windows Vista\Vista SP2 VistaLoader v4.1\vistaloader 4.1.exe, 11-8802
Malware.Packer, File, G:\Nothing Much\Players\Winamp Pro v5.56 Multilingual\Key Generator Pack\KG tRUE\tRUE's.KeyGen.exe, 11-1


mafia87
View Public Profile
Send a private message to mafia87
Find all posts by mafia87
Old 07-18-2009, 10:56 PM
evilfantasy's Avatar
evilfantasy evilfantasy is offline
HijackThis log analyzer

Join Date: Dec 2008
Location: Tulsa, OK
Posts: 75
Default

Quote:
Originally Posted by mafia87 View Post
The files listed here is all key generator or cracks.... None of it are virus, trojan etc...
What makes you think a crack or keygen isn't infected or that IObit should support such software?
evilfantasy
View Public Profile
Send a private message to evilfantasy
Visit evilfantasy's homepage!
Find all posts by evilfantasy
Old 07-28-2009, 07:53 PM
genroxbro genroxbro is offline
Banned

Join Date: Jul 2009
Location: Canada
Posts: 2
Send a message via ICQ to genroxbro
Default False Positive Report

I sent a false positive report via SAS recently but as Ive heard nothing probably just too impatient I thought Id follow it up here.

All of my executables created with AutoIT report as Trojan Agent/Gen-TempZ with SAS and MBAM yet several other programs dont detect a problem.

Can you please test and advise?

Ta,

4Eyes
_____________________________________
Website I designed for cash advances company.

Last edited by enoskype : 07-28-2009 at 09:51 PM. Reason: Link is de-linked
genroxbro
View Public Profile
Find all posts by genroxbro
Old 07-28-2009, 08:35 PM
evilfantasy's Avatar
evilfantasy evilfantasy is offline
HijackThis log analyzer

Join Date: Dec 2008
Location: Tulsa, OK
Posts: 75
Default

Give a good reason why cracks and keygens should not be detected as a risk?

If it's unpaid for then it is stealing, period, and I'm glad some vendors are bold enough to include them in their detections.

Also your signature is spam... EDIT by enoskype:Link is de-linked in above post. (It was an ordinary link, not a signature.)

P.S. I know the owners of SAS. They might reply to you but they won't remove them. They don't like anyone stealing their software so why should they support any stolen program...

Last edited by evilfantasy : 07-28-2009 at 08:39 PM.
evilfantasy
View Public Profile
Send a private message to evilfantasy
Visit evilfantasy's homepage!
Find all posts by evilfantasy


Thread Tools


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
IObit Security 360 Free Download | Advanced SystemCare Free Download




Forum Jump


All times are GMT. The time now is 08:58 PM.
Registry cleaner | Defragment | Free registry cleaner | Game booster | ExeDll Library | Malware Library

Archive - Sitemap - Top

Powered by vBulletin® Version 3.6.8
Copyright ©2000 - 2009, Jelsoft Enterprises Ltd.
Read More
Posted in | No comments

Monday, November 2, 2009

IOBit Steals Malwarebytes’ Intellectual Property

Posted on 11:52 AM by Unknown
Malwarebytes has recently uncovered evidence that a company called IOBit based in China is stealing and incorporating our proprietary database and intellectual property into their software. We know this will sound hard to believe, because it was hard for us to believe at first too. But after an indepth investigation, we became convinced it was true. Here is how we know.

We came across a post on the IOBit forums (cached version since they deleted the thread - well, now the cached version got deleted as well. Glad I still have a screenshot, see below) that showed IOBit Security 360 flagging a specific key generator for our Malwarebytes’ Anti-Malware software using the exact naming scheme we use to flag such keygens: Don’t.Steal.Our.Software.A.



Dont.Steal.Our.Software.A, File, G:\Nothing Much\Anti-Spyware\Malwarebytes’ Anti-Malware v1.39\Key_Generator.exe, 9-30501

Why would IOBit detect a keygen for our software and refer to it using our database name? We quickly became suspicious. Either the forum post was fraudulent or IOBit was stealing our database.

So we dug further. We accumulated more similar evidence for other detections, and we soon became convinced that this was not a mistake, it was not a coincidence, it was not an isolated event, and it persisted presently in their current database. They are using both our database and our database format exactly.

The final confirmation of IOBit’s theft occurred when we added fake definitions to our database for a fake rogue application we called Rogue.AVCleanSweepPro. This “malware” does not actually exist: we made it up. We even manufactured fake files to match the fake definitions. Within two weeks IOBit was detecting these fake files under almost exactly these fake names.

We can’t publicly show all the evidence we found, because it is still our intellectual property: proprietary information about our database internals. But we don’t want you to have to take our word for it either, so we found a way to show you an example illustrating an indisputable pattern of theft.

Consider the file, dummy.exe. It is a harmless dummy executable that runs, displays a “Hello World” message box, and exits. You can see from third-party scans on VirusTotal, that no other security vendor flags this executable as malicious or even suspicious.

We created this dummy executable, then manipulated it slightly so that it matches one of the signatures in our database. We emphasize that it is still not malicious! — the signature is perfectly benign, when not in the context of actual malware, as you can see from the VirusTotal results.

We scanned the file with our own Malwarebytes’ Anti-Malware software and indeed it was flagged as “Don’t.Steal.Our.Software.A”. We scanned it with IOBit using their current build and database version and it was flagged as the same “Don’t.Steal.Our.Software.A”. We have included log file file and a screenshot of the detection. You can verify by yourself using the dummy executable and their most recent database.

We have attached two other such dummy executables to this post, so you can see for yourself. One of them, “rogue.exe”, matches our fake Rogue.AVCleanSweepPro (screenshot) definition, the other “fake.exe”, matches our Adware.NaviPromo definition (screenshot). VirusTotal results for “fake.exe” and “rogue.exe” so you can see they are benign. You can see a screenshot of our detections here.


During the course of our investigation, we uncovered additional evidence that IOBit may have stolen the proprietary databases of other security vendors as well. We are in the process of contacting these vendors.

Malwarebytes intends to pursue legal action against IOBit. We demand IOBit immediately remove all traces of Malwarebytes’ proprietary research and database from their software. We also demand IOBit be delisted from Download.com due to Terms of Service violations. This is criminal: it is theft, it is fraud, and we will not stand for it.

What can you do to help? If you feel the same way we do about this theft, we encourage you to send an email to hosting services such as Download.com and Majorgeeks.com requesting that all IOBit software be removed.


Copy/paste of the original Article here


Update to this post: IOBit’s Denial of Theft Unconvincing
Read More
Posted in Rant | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • 3 stubborn PC problems you can fix
    Copy from retired Microsoft at Work website (retired June 30, 2013), Copyright Microsoft.  3 stubborn PC problems you can fix Ever notice h...
  • Reminder for Forum owners
    This post is actually a reminder to my previous blog post http://miekiemoes.blogspot.com/2008/04/forum-owners-take-your-responsability.html ...
  • Forum owners - Take your responsibility!!
    After we had this , with a little update here , I'm still amazed how many website owners don't take responsibility. I was researchin...
  • Email-Worm.Win32.Locksky - new stubborn variant
    I was helping a user the other day where his computer was crippled with malware. We could successfully delete all other files, registry keys...
  • Beware Telenet.be users - Telenet.be phishing scam going around
    First of all - WOW! It has been ages I have blogged here ! I really should start to blog more often again. Work & life has kept me real ...
  • Miekiemoes rules ?? Yeah right...
    This is about the Searchengine Hijack I blogged about a couple of months ago. Files responsible for this hijack are sysaudio.sys or wdmaud...
  • Friendship
    The source of these images is unknown. They were in one of those forwarded emails -- you know, the type your friends are sure you will love...
  • Fake sysaudio.sys causes Searchengine Hijack
    What is this infection about... It actually loads a script, so searchengine results are loaded within a script. For example, when you resear...
  • 10 tips to help improve your wireless network
    Copy from the retired "Microsoft at Home" website (retired 30June2013), copyright Microsoft. 10 tips to help improve your wireless...
  • Joomla! Password Reset/Remind Functionality vulnerability - update asap!
    There was a serious security vulnerability found in the popular CMS-software Joomla! (1.5.x, including 1.5.5). The vulnerability/bug resides...

Categories

  • BlogTools
  • Compromised
  • databases
  • dogs
  • email
  • Exploits
  • Firefox
  • forums
  • Funny
  • hacks
  • Internet Explorer
  • Malware
  • Me
  • Mobile
  • Online Tools
  • Other
  • phish
  • Popups
  • Prevention
  • Rant
  • Recipe
  • Registry
  • Rogue
  • scam
  • Security Products
  • Slow computer
  • Software
  • spam
  • websites
  • Windows
  • Windows Update
  • Windows Vista

Blog Archive

  • ►  2013 (11)
    • ►  June (9)
    • ►  April (1)
    • ►  February (1)
  • ►  2012 (4)
    • ►  December (1)
    • ►  November (1)
    • ►  August (1)
    • ►  January (1)
  • ►  2011 (2)
    • ►  November (2)
  • ►  2010 (3)
    • ►  November (1)
    • ►  October (1)
    • ►  April (1)
  • ▼  2009 (13)
    • ▼  November (2)
      • IObit Cached Page
      • IOBit Steals Malwarebytes’ Intellectual Property
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ►  March (2)
    • ►  February (2)
    • ►  January (3)
  • ►  2008 (71)
    • ►  December (1)
    • ►  November (8)
    • ►  October (5)
    • ►  September (5)
    • ►  August (7)
    • ►  July (5)
    • ►  June (12)
    • ►  May (8)
    • ►  April (6)
    • ►  March (5)
    • ►  February (9)
Powered by Blogger.

About Me

Unknown
View my complete profile