{"id":15238,"date":"2020-08-03T12:41:07","date_gmt":"2020-08-03T10:41:07","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=15238"},"modified":"2022-03-24T00:42:23","modified_gmt":"2022-03-23T23:42:23","slug":"windows-defender-lscht-windows-hosts-datei-teil-2","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/08\/03\/windows-defender-lscht-windows-hosts-datei-teil-2\/","title":{"rendered":"Defender flags Windows Hosts file as malicious &#8211; Part 2"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/08\/03\/windows-defender-lscht-windows-hosts-datei-teil-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]It looks like the Windows Defender has run amok again and considers the Windows hosts file as malicious and complains about it as HostFileHijack. I've had now a few confirmation from other users.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg05.met.vgwort.de\/na\/650998e7dad14098b86bb0931aebf08f\" alt=\"\" width=\"1\" height=\"1\" \/>I had only published the blog post <a href=\"https:\/\/borncity.com\/win\/2020\/07\/30\/windows-defender-markiert-ccleaner-als-pup-teil-1\/\">Windows Defender flags CCleaner as PUP \u2013 Part 1<\/a> a few days ago &#8211; and I've planned the 2nd article for the next day &#8211; but it has been delayed.<\/p>\n<h2>A reader comment<\/h2>\n<p>It was a reader's comment from Blog Reader Info here in the comments section that gave me the idea for this article &#8211; maybe there are other people who have noticed this. The reader wrote somewhat cryptically:<\/p>\n<blockquote><p><strong>[WINDOWS SECURITY]<\/strong><br \/>\nWhat took you so long?<\/p>\n<p>Since 28.07.2020 the W10 Defender(quick check) only recognizes the \"C:\\Windows\\System32\\drivers\\etc\\<strong>hosts<\/strong>\" as \"<strong>HostFileHijack<\/strong>\".<\/p>\n<p>Very old hat with other av programs<\/p>\n<p>Antimalware-Clientversion: 4.18.2006.10<br \/>\nModulversion: 1.1.17300.4<br \/>\nAntiviren-Version: 1.321.144.0<br \/>\nAntispyware-Version: 1.321.144.0<\/p><\/blockquote>\n<p>and added the following as a supplement.<\/p>\n<blockquote><p>Someone has probably only now noticed that<\/p>\n<p>Statistik<br \/>\nTelemetrie<br \/>\nBing\u2026<\/p>\n<p>of certain clients is no longer arriving reliably&#8230;<\/p><\/blockquote>\n<p>I con't have an idea what the last remark means- but I published the translated text into the post here as I sporadically delete old comments in the discussion area of the German blog.<\/p>\n<h2>Findings in the Internet<\/h2>\n<p>At this place I searched the internet a few days ago and found this few days old <a href=\"https:\/\/www.reddit.com\/r\/antivirus\/comments\/hzvzc8\/wtf_am_i_going_to_do\/\" target=\"_blank\" rel=\"noopener noreferrer\">thread on reddit.com<\/a>.\u00a0 A user noticed the same thing &#8211; because he writes:<\/p>\n<blockquote><p>Wtf am I going to do&#8230;<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.redditstatic.com\/desktop2x\/img\/renderTimingPixel.png\" alt=\"\" \/>For the first time since building this computer 7 years ago, I somehow got a virus. It was called HostFileHijack or something, Windows defense picked it up but was unable to remove it. I installed Zamena and it detected the virus and was able to remove it, but about 20 minutes later windows detected it again but Zamena didn't detect anything. It's seemingly disappeared from my computer for now but I don't trust it. Should I just go about my business or bite the bullet, back up 400GB of data and format?<\/p><\/blockquote>\n<p>So the affected user seems to have a similar problem (although he probably really did have a virus), the Defender reports a HostFileHijack infection, but cannot remove it. After removing it with other AV software a message came up again (although in this case I consider the system as compromised anyway, this would have to be rebuilt, since you never know if all the malware was detected and removed). In the course of the thread, however, ESET security specialist Aryeh Goretsky points out that<\/p>\n<p>C:\\Windows\\System32\\drivers\\etc\\<strong>hosts<\/strong><\/p>\n<p>is simply a text file. If there is nothing bad in it, it should be a false alarm. It is strange, however, that the Defender is only now complaining about the file &#8211; which would be consistent with the reader observations above. But the story is a bit strange.<\/p>\n<h2>What is HostFileHijack<\/h2>\n<p>With this term you can find it at Microsoft in <a href=\"https:\/\/web.archive.org\/web\/20190112062004\/https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=SettingsModifier%3AWin32%2FPossibleHostsFileHijack\" target=\"_blank\" rel=\"noopener noreferrer\">this article<\/a> (and <a href=\"https:\/\/web.archive.org\/web\/20201101110353\/https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?name=SettingsModifier%3AWin32%2FHostsFileHijack&amp;threatid=265754\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>). The Defender detects the malware SettingsModifier:Win32\/PossibleHostsFileHijack, a program that makes changes to the hosts file on a Windows system. Microsoft writes:<\/p>\n<blockquote><p>The Hosts file is used by your web browser to find out where to redirect certain IP address calls. Malicious or unwanted software can modify this file to prevent users and applications from accessing certain websites. Or the malware may force you to visit other websites instead.<\/p><\/blockquote>\n<p>Microsoft's advice: If you changed the Hosts file yourself, you must exclude it from detection by your antivirus software. Well, and this is now a problem: If I have made changes, with this exception, I disable Defender with regard to monitoring the hosts file. If malware strikes and manipulates this file, Defender is blind. In this case it would be better if there was a hash in Defender that excludes a certain version of the hosts from a check. If the hash value changes, the hosts have been changed, so the alert should be raised again.<\/p>\n<blockquote><p>There is <a href=\"https:\/\/web.archive.org\/web\/20201022091529\/https:\/\/rules.ssw.com.au\/do-you-add-an-exception-for-hosts-file-on-windows-defender\" target=\"_blank\" rel=\"noopener noreferrer\">this article<\/a> from 2016, which also addresses this and recommends to define the hosts from exception in Defender, if you have made changes yourself. Otherwise you would get the Defender alerts.\u00a0 But even there it is not recognized that with the definition of the exceptions the Defender is blind and does not recognize a malicious manipulation.<\/p><\/blockquote>\n<h2>Feedback of a user<\/h2>\n<p>Addendum: By e-mail, blog reader Rolf (thanks for that) sent me the following information:<\/p>\n<blockquote><p>the problem with the Defender and the host file SettingsModifier:Win32\/PossibleHostsFileHijack<br \/>\nexists since 28.7.2020.<\/p>\n<p>I have helped myself in the following way: Disabled detection by Defender and made the host file read-only.<\/p><\/blockquote>\n<p>Anyone of you who affected? I hadn't heard of this behavior before. <strong>Addendum:<\/strong> After a discussion with me Lawrence Abrams took also a look at that topic and published<a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/windows-10-hosts-file-blocking-telemetry-is-now-flagged-as-a-risk\/\" target=\"_blank\" rel=\"noopener noreferrer\"> some additional information on Bleeping Computer<\/a>.<\/p>\n<p><strong>Similar article:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2020\/07\/30\/windows-defender-markiert-ccleaner-als-pup-teil-1\/\">Windows Defender flags CCleaner as PUP \u2013 Part 1<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/08\/03\/windows-defender-lscht-windows-hosts-datei-teil-2\/\">Defender flags Windows Hosts file as malicious &#8211; Part 2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/08\/04\/defender-blocks-redirected-microsoft-hosts-entries-part-3\/\">Defender blocks redirected Microsoft hosts entries \u2013 Part 3<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/06\/12\/microsoft-defender-antimalware-platform-juni-2020-update-kb4052623-wirft-error-0x8024200b\/\">Microsoft Defender Antimalware Platform: June 2020 Update KB4052623 drops Error 0x8024200B<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/04\/17\/scep-mse-defender-broken-signatureupdate-kills-microsoft-antivirus-04-16-2020\/\">SCEP\/MSE\/Defender: Broken Signatureupdate kills Microsoft Antivirus (04\/16\/2020)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/04\/11\/defender-stufte-flschlich-winaero-tweaker-als-hacker-tool-ein\/\">Defender mis-classified Winaero Tweaker as a hacker tool<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]It looks like the Windows Defender has run amok again and considers the Windows hosts file as malicious and complains about it as HostFileHijack. I've had now a few confirmation from other users.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,2],"tags":[646,773,194],"class_list":["post-15238","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-windows","tag-antivirus","tag-defender","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/15238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=15238"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/15238\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=15238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=15238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=15238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}