Jump to content

Windows 10: HOSTS file blocking telemetry is now flagged as a risk

Korben

Thank you Diversion (installed in my router) that blocks this in the router (when I’m working from home since only my work laptop is a windows machine, I’m a mac user when using my own computer).

Link to comment
Share on other sites

Link to post
Share on other sites

I mean technically the computer might get say... security definition updates for Windows Defender from their servers and it can't if that is stopping it. 

So in that aspect it technically is a risk. 

But yeah I don't really like this

"If a Lobster is a fish because it moves by jumping, then a kangaroo is a bird" - Admiral Paulo de Castro Moreira da Silva

"There is nothing more difficult than fixing something that isn't all the way broken yet." - Author Unknown

Spoiler

Intel Core i7-3960X @ 4.6 GHz - Asus P9X79WS/IPMI - 12GB DDR3-1600 quad-channel - EVGA GTX 1080ti SC - Fractal Design Define R5 - 500GB Crucial MX200 - NH-D15 - Logitech G710+ - Mionix Naos 7000 - Sennheiser PC350 w/Topping VX-1

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, Korben said:

but still I don't like this kind of manipulations.

I guess you didnt knew about win10 selectively ignoring entries in the hosts file....

 

Link to comment
Share on other sites

Link to post
Share on other sites

Is it detecting telemetry blocking entries specifically or just blanket HOSTS modification detection that gets triggere even if you put something nonsensical in it?

Link to comment
Share on other sites

Link to post
Share on other sites

Yeah um my host files have a big list there.. 

| Ryzen 7 7800X3D | AM5 B650 Aorus Elite AX | G.Skill Trident Z5 Neo RGB DDR5 32GB 6000MHz C30 | Sapphire PULSE Radeon RX 7900 XTX | Samsung 990 PRO 1TB with heatsink | Arctic Liquid Freezer II 360 | Seasonic Focus GX-850 | Lian Li Lanccool III | Mousepad: Skypad 3.0 XL / Zowie GTF-X | Mouse: Zowie S1-C | Keyboard: Ducky One 3 TKL (Cherry MX-Speed-Silver)Beyerdynamic MMX 300 (2nd Gen) | Acer XV272U | OS: Windows 11 |

Link to comment
Share on other sites

Link to post
Share on other sites

And that's why you either disable telemetry in the group policy/registry or block the servers in your router.

CPU: AMD Ryzen 3700x / GPU: Asus Radeon RX 6750XT OC 12GB / RAM: Corsair Vengeance LPX 2x8GB DDR4-3200
MOBO: MSI B450m Gaming Plus / NVME: Corsair MP510 240GB / Case: TT Core v21 / PSU: Seasonic 750W / OS: Win 10 Pro

Link to comment
Share on other sites

Link to post
Share on other sites

3 hours ago, HM-2 said:

It takes literally two seconds to add a file exclusion for hosts.txt in the security console.

If you're savy enough to be fiddling around with the host file and actually understanding what the changes your making do, you're able to add an exclusion in an AV application.

I agree with most of what you say though. If you are making changes to the host file then you should probably also know how to make exclusions in Windows Defender.

I think "you can just change it, it only takes X number of minutes" is a weak excuse which is used far too often these days to justify anti-consumer behavior. Same with all the ads that are in Windows where people go "well you can turn them off if you know where to look and spend some time changing it".

 

 

 

3 hours ago, leadeater said:

Then don't put Microsoft domains in there and it won't nag you. Defender is not preventing any modification of the Hosts file, just ones that might be malicious like other AV also do. Difference is other AV software are not flagging Microsoft domains even though they could actually be malicious, probably for the reasons exhibited in this topic, user backlash.

Like I said in my first post, legitimate reason exist for warning about this, personal reasoning will be the difference between how one portrays it.

 

Making changes to your Hosts file is still fully supported, still do that to test things like Load Balancer changes without making the DNS change live on the entire network.

 

Edit:

Also why does it not surprise me that it's turned from specifically Microsoft domains, as mentioned in the source article, to any changes even though that is not the case. The spin here is rather strong.

 

Like I get that this could just be Microsoft wanting to have their cake and eat it to, finding a reason to make a change they have been wanting to do but it's not like warning about Hosts file changes for Microsoft domains isn't actually legitimate thing to do.

Agree. I don't think it's a coincidence that Microsoft has made it more difficult to disable telemetry though. Like I said in my original post, I agree that there are legitimate reasons for AVs to check the host file. But it's no secret that Microsoft really wants to collect data on their users, and this makes it a bit harder for people to protect themselves against that.

 

 

 

  

2 hours ago, RejZoR said:

Is it detecting telemetry blocking entries specifically or just blanket HOSTS modification detection that gets triggere even if you put something nonsensical in it?

According to the article, it lets regular edits of the host file through but blocks and/or flags the ones related to Microsoft/Windows.

Link to comment
Share on other sites

Link to post
Share on other sites

8 minutes ago, LAwLz said:

I think "you can just change it, it only takes X number of minutes" is a weak excuse which is used far too often these days to justify anti-consumer behavior.

I fail to see how this is "anticompetitive" in any way. Detection of host file modification focusing on MS and major security vendors is something that many AV products already do, and with good reason. I would guestimate that amongst the Windows user base malicious modification of the host file by malware designed to prevent its removal is multiple orders of magnitude more common than instituting host file changes to block MS telemetry or services. If you're a power user then you can circumvent this very easily, but for the 99.99% of their user base this is a beneficial thing.

[ P R O J E C T _ M E L L I F E R A ]

[ 5900X @4.7GHz PBO2 | X570S Aorus Pro | 32GB GSkill Trident Z 3600MHz CL16 | EK-Quantum Reflection ]
[ ASUS RTX4080 TUF OC @3000MHz | O11D-XL | HardwareLabs GTS and GTX 360mm | XSPC D5 SATA ]

[ TechN / Phanteks G40 Blocks | Corsair AX750 | ROG Swift PG279Q | Q-Acoustics 2010i | Sabaj A4 ]

 

P R O J E C T | S A N D W A S P

6900K | RTX2080 | 32GB DDR4-3000 | Custom Loop 

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, HM-2 said:

I fail to see how this is "anticompetitive" in any way.

I never said it was anti-competitive though.

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, LAwLz said:

I never said it was anti-competitive though.

Sorry, "anti-consumer". It's pro-consumer for the vast majority of the userbase. 

[ P R O J E C T _ M E L L I F E R A ]

[ 5900X @4.7GHz PBO2 | X570S Aorus Pro | 32GB GSkill Trident Z 3600MHz CL16 | EK-Quantum Reflection ]
[ ASUS RTX4080 TUF OC @3000MHz | O11D-XL | HardwareLabs GTS and GTX 360mm | XSPC D5 SATA ]

[ TechN / Phanteks G40 Blocks | Corsair AX750 | ROG Swift PG279Q | Q-Acoustics 2010i | Sabaj A4 ]

 

P R O J E C T | S A N D W A S P

6900K | RTX2080 | 32GB DDR4-3000 | Custom Loop 

Link to comment
Share on other sites

Link to post
Share on other sites

55 minutes ago, TetraSky said:

And that's why you either disable telemetry in the group policy/registry or block the servers in your router.

Only if you are running server AFAIK, for every other version no matter how low you set the GP/registry it will default to basic......

Link to comment
Share on other sites

Link to post
Share on other sites

I thought Microsoft telemetry ignores the host file.

I recall a whole discussion here of it not working.

I think this is just malware protection, and nothing to do with telemetry data as it never worked in any case.

Link to comment
Share on other sites

Link to post
Share on other sites

49 minutes ago, LAwLz said:

anti-consumer behavior

Are there more power-users using Windows, or non-power-users who don't even know about the hosts-file, let alone who'd modify it? Oh, that's right -- there are FAR more of the latter people, ergo protecting them first IS pro-consumer behaviour.

Hand, n. A singular instrument worn at the end of the human arm and commonly thrust into somebody’s pocket.

Link to comment
Share on other sites

Link to post
Share on other sites

14 minutes ago, WereCatf said:

Are there more power-users using Windows, or non-power-users who don't even know about the hosts-file, let alone who'd modify it? Oh, that's right -- there are FAR more of the latter people, ergo protecting them first IS pro-consumer behaviour.

New concept "pro-certain-consumer" behavior.

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, LAwLz said:

According to the article, it lets regular edits of the host file through but blocks and/or flags the ones related to Microsoft/Windows.

Question is, are those entries really telemetry only or do they happen to block cloud connections of Windows Defender. Because I've seen "block lists" that go beyond just telemetry and just block too much.

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, RejZoR said:

Question is, are those entries really telemetry only or do they happen to block cloud connections of Windows Defender. Because I've seen "block lists" that go beyond just telemetry and just block too much.

It seems to be anything related to Microsoft.

Link to comment
Share on other sites

Link to post
Share on other sites

Called it! :P 

 

 

8 hours ago, WereCatf said:

More capable users can go and excluse the hosts-file and continue using it as they've done this far.

Which is a bad thing? Because, as you said:

8 hours ago, WereCatf said:

There are plenty of malware and other kinds of less-than-honourable actors that mess around with the hosts-file,

which means excluding the file is not a solution. Only white-listing individual entries would be a solution, but that doesn't seem feasible.

 

False positives are a problem, there are no two ways about it, that's why you try to minimize them as much as you can. Workarounds involving excluding files known to be targets for malware is one of the reasons why. False positives create an artificial trade-off between security and usability (there's always a trade-off, false positives make it artificially harsher).

 

 

8 hours ago, HM-2 said:

You can choose whether or not to respond to or ignore the alert raised by Defender, so if you want to block MS IP address ranges cos your tinfoil hat is on too tight then you still can, you'll just get Defender telling you that you have.

As far as I've seen, you can't, it's instant quarantine. You have to exclude it altogether. In fact, notifying so you can check there are no additional changes than the ones you want would be a much better workaround.

 

8 hours ago, HM-2 said:

It takes literally two seconds to add a file exclusion for hosts.txt in the security console. If you're savy enough to be fiddling around with the host file and actually understanding what the changes your making do, you're able to add an exclusion in an AV application.

Which is a problem, see above.

 

 

8 hours ago, porina said:

I've encountered this in the past with some AV package I don't recall. I'd consider this a false positive myself. There are legitimate reasons for editing a host file. As long as you have a way to exclude it, it isn't a major deal.

I agree except for the last bit: false positives and exclusion workarounds are a security concern just like false negatives are (see above).

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, SpaceGhostC2C said:

False positives 

I wouldn't describe this as a false positive; it's a non-malicious true positive. It's not an error in the detection logic caused by too broad or generic a signature, it's doing exactly what it's designed to do.

[ P R O J E C T _ M E L L I F E R A ]

[ 5900X @4.7GHz PBO2 | X570S Aorus Pro | 32GB GSkill Trident Z 3600MHz CL16 | EK-Quantum Reflection ]
[ ASUS RTX4080 TUF OC @3000MHz | O11D-XL | HardwareLabs GTS and GTX 360mm | XSPC D5 SATA ]

[ TechN / Phanteks G40 Blocks | Corsair AX750 | ROG Swift PG279Q | Q-Acoustics 2010i | Sabaj A4 ]

 

P R O J E C T | S A N D W A S P

6900K | RTX2080 | 32GB DDR4-3000 | Custom Loop 

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, HM-2 said:

I wouldn't describe this as a false positive; it's a non-malicious true positive.

Of course it is a false positive, there is no malware involved here. Just people using the hosts file a they would, or third-party programs adding entries to it at the users' request

1 minute ago, HM-2 said:

It's not an error in the detection logic caused by too broad or generic a signature, it's doing exactly what it's designed to do.

Every positive, false or not, is the outcome of an algorithm flagging as positive what it was designed to flag as such. That's just tautological.

The only way to argue it is not "false" would be to argue that it is flagging what it was intended to flag, meaning that Microsoft wants to detect not only malware messing with MS's addresses, but also individuals and privacy tools that redirect those MS's addresses to 127.0.0.1 or 0.0.0.0 on purpose - in which case, terrible move form Microsoft. Either way, the result is reduced security or giving up your current choices about how your computer is to operate. Which is exactly the problem with false positives, but call it what you want.

Link to comment
Share on other sites

Link to post
Share on other sites

25 minutes ago, SpaceGhostC2C said:

Of course it is a false positive, there is no malware involved here.

I think you're misunderstanding the definition of a "false positive" in the context of malware detection.

25 minutes ago, SpaceGhostC2C said:

The only way to argue it is not "false" would be to argue that it is flagging what it was intended to flag

Which it is. That much is abundantly clear from the definition it is ascribed. As I previously noted, a static signature used in on-access or routine file scanning cannot tell the difference between a modification to the host file to redirect MS domains to Loopback made voluntarily by a user from one made maliciously to prevent malware removal.

 

Having just tested it in my malware lab VM, direct editing of the hosts file will trigger Defender, but copying the host file elsewhere on the system, editing and copying back won't until an on-access scan is performed; this approach gives you the option to remove, quarantine, or permit.

 

Untitled.png

[ P R O J E C T _ M E L L I F E R A ]

[ 5900X @4.7GHz PBO2 | X570S Aorus Pro | 32GB GSkill Trident Z 3600MHz CL16 | EK-Quantum Reflection ]
[ ASUS RTX4080 TUF OC @3000MHz | O11D-XL | HardwareLabs GTS and GTX 360mm | XSPC D5 SATA ]

[ TechN / Phanteks G40 Blocks | Corsair AX750 | ROG Swift PG279Q | Q-Acoustics 2010i | Sabaj A4 ]

 

P R O J E C T | S A N D W A S P

6900K | RTX2080 | 32GB DDR4-3000 | Custom Loop 

Link to comment
Share on other sites

Link to post
Share on other sites

I'll leave the argument if it is correct to call it a "false positive" for now. From a user perspective, if I want to do something, I don't want something to stop me. This is the biggest reason I've stopped using 3rd party AV solutions, as they try overly hard to justify their value for existence. They flag a ton of enthusiast (low level hardware accessing) software as PUPs. I don't want to deal with that crap. The MS one I only tolerate as it rarely generates any noise, but I have also run many systems totally AV free because they waste more of my time than saving me from anything. In the broadband era, I've had exactly zero useful detections from AV or malware software.

Main system: i9-7980XE, Asus X299 TUF mark 2, Noctua D15, Corsair Vengeance Pro 3200 3x 16GB 2R, RTX 3070, NZXT E850, GameMax Abyss, Samsung 980 Pro 2TB, Acer Predator XB241YU 24" 1440p 144Hz G-Sync + HP LP2475w 24" 1200p 60Hz wide gamut
Gaming laptop: Lenovo Legion 5, 5800H, RTX 3070, Kingston DDR4 3200C22 2x16GB 2Rx8, Kingston Fury Renegade 1TB + Crucial P1 1TB SSD, 165 Hz IPS 1080p G-Sync Compatible

Link to comment
Share on other sites

Link to post
Share on other sites

Weird, my old HOSTS file taken from StevenBlack repo a year ago got instant flagged and quarantined but Defender didn't flag when i use his latest release . Both got some microsoft domain in it. 🤔

| Intel i7-3770@4.2Ghz | Asus Z77-V | Zotac 980 Ti Amp! Omega | DDR3 1800mhz 4GB x4 | 300GB Intel DC S3500 SSD | 512GB Plextor M5 Pro | 2x 1TB WD Blue HDD |
 | Enermax NAXN82+ 650W 80Plus Bronze | Fiio E07K | Grado SR80i | Cooler Master XB HAF EVO | Logitech G27 | Logitech G600 | CM Storm Quickfire TK | DualShock 4 |

Link to comment
Share on other sites

Link to post
Share on other sites

6 hours ago, xAcid9 said:

Weird, my old HOSTS file taken from StevenBlack repo a year ago got instant flagged and quarantined but Defender didn't flag when i use his latest release . Both got some microsoft domain in it. 🤔

Chances are it will get flagged again if you do a manual scan, or if the automatic scan kicks in later.

Link to comment
Share on other sites

Link to post
Share on other sites

16 hours ago, LAwLz said:

Chances are it will get flagged again if you do a manual scan, or if the automatic scan kicks in later.

I tried manual scan yesterday, nothing happen. Forgot to try pasting the old content and see if it instantly flag the file again. 

| Intel i7-3770@4.2Ghz | Asus Z77-V | Zotac 980 Ti Amp! Omega | DDR3 1800mhz 4GB x4 | 300GB Intel DC S3500 SSD | 512GB Plextor M5 Pro | 2x 1TB WD Blue HDD |
 | Enermax NAXN82+ 650W 80Plus Bronze | Fiio E07K | Grado SR80i | Cooler Master XB HAF EVO | Logitech G27 | Logitech G600 | CM Storm Quickfire TK | DualShock 4 |

Link to comment
Share on other sites

Link to post
Share on other sites

On 8/5/2020 at 4:31 AM, leadeater said:

Then it won't affect you, viruses and malware do make changes to the hosts file and put Microsoft domains in there to point to malicious places. You can cut this story basically any way you like depending on your leaning towards or against Microsoft.

 

Other AV software do check the hosts file for known malicious entries yes.

I use Spybot, and it adds literately 15636 entries to the HOSTS file. Just scrolling through the list it seems like 99% of them are fake-everythings like typosquats for other antivirus products and look-a-like domains due to the I and l looking the same with sans-serif fonts.

 

... seriously we've been dealing with I and l looking the same for a really long time, maybe the address bar should use a serif font.

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×