{"id":15251,"date":"2020-08-04T08:23:37","date_gmt":"2020-08-04T06:23:37","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=15251"},"modified":"2020-08-04T08:27:11","modified_gmt":"2020-08-04T06:27:11","slug":"defender-blocks-redirected-microsoft-hosts-entries-part-3","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/08\/04\/defender-blocks-redirected-microsoft-hosts-entries-part-3\/","title":{"rendered":"Defender blocks redirected Microsoft hosts entries &#8211; Part 3"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/08\/04\/windows-defender-blockt-hosts-eintrge-mit-umleitungen-von-microsoft-seiten-teil-3\/\">English<\/a>]Microsoft has begun to block redirects in the Windows native hosts file that affect Microsoft sites in its antivirus products such as Microsoft Defender. The redirects are flagged as malicious (as HostFileHijack). I already mentioned that in part 2 of the article series &#8211; but now I get a more complete picture.<\/p>\n<p><!--more--><\/p>\n<h2>The hosts file in Windows<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg05.met.vgwort.de\/na\/d55a717866a149d18657656a0b5469e4\" alt=\"\" width=\"1\" height=\"1\" \/>In Windows there is the hosts file, a simple text file located in the following folder.<\/p>\n<p>C:\\Windows\\System32\\drivers\\etc\\hosts<\/p>\n<p>Windows allows administrators to easily set up redirections from host names to IP addresses via the hosts file. Some users use entries in the hosts file to redirect Microsoft network addresses to which telemetry data is transmitted to the local IP address 127.0.0.0. The Microsoft server in question can then no longer be reached.<\/p>\n<h2>Microsoft say no, and puts a stop on it<\/h2>\n<p>This approach is now likely to be stopped by Microsoft on systems running Windows Defender (or any other Microsoft antivirus solution). I had reported in the blog post <a href=\"https:\/\/borncity.com\/win\/2020\/08\/03\/windows-defender-lscht-windows-hosts-datei-teil-2\/\">Windows Defender flags Windows Hosts file as malicious \u2013 Part 2<\/a> that Microsoft Defender suddenly considers a modified native Windows hosts file to be malicious and complains that it is a HostFileHijack. This has been happening since July 28, 2020 with the following components:<\/p>\n<p>Antimalware-Clientversion: 4.18.2006.10<br \/>\nModulversion: 1.1.17300.4<br \/>\nAntiviren-Version: 1.321.144.0<br \/>\nAntispyware-Version: 1.321.144.0<\/p>\n<p>The blog reader who observed this and gave a tip wrote: \"<em>Someone has probably only now noticed that statistics, telemetry, Bing&#8230; of certain clients no longer arrive reliably<\/em>.\" The last information was not quite comprehensible for me, even though Blog-reader Info has added this comment in part 2. The same applies to the remarks of Mark Heitbrink in his <a href=\"https:\/\/www.borncity.com\/blog\/2020\/08\/03\/windows-defender-lscht-windows-hosts-datei-teil-2\/#comment-92835\" target=\"_blank\" rel=\"noopener noreferrer\">German comment<\/a> yesterday. I only became aware of this afterwards, when the following puzzle pieces fell into the picture.<\/p>\n<h2>Defender blocks redirected Microsoft pages<\/h2>\n<p>I spent the night on Twitter with Lawrence Abrams of Bleeping Computer in a private communication on the subject. He had become aware of the issue through the English language version of my post. So he took another look at the whole thing, tested it and came across some connections. Lawrence has now <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/windows-10-hosts-file-blocking-telemetry-is-now-flagged-as-a-risk\/\" target=\"_blank\" rel=\"noopener noreferrer\">published some additional information on Bleeping Computer<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">After learning about this today from <a href=\"https:\/\/twitter.com\/etguenni?ref_src=twsrc%5Etfw\">@etguenni<\/a>, BleepingComputer performed some tests to see if this was a false positive or something else triggering the detections.<\/p>\n<p>\u2014 BleepingComputer (@BleepinComputer) <a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1290413813351755776?ref_src=twsrc%5Etfw\">August 3, 2020<\/a><\/p><\/blockquote>\n<p><span id=\"preserve7ec28dd9d3704c3da9f5460aaf75f7e4\" class=\"wlWriterPreserve\"><script src=\"https:\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/span><\/p>\n<p>The above tweet already summarizes the situation. If the Microsoft virus scanner detects a manipulation in the file hosts and you allow the Microsoft Defender to delete the file, its content is reset to default settings. Then Lawrence Abrams tested my hint that some users use the hosts file to block Microsoft URLs.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Now when you try to add a Microsoft privacy HOSTS file, Windows Defender will not allow you to save the file as it \"contains a virus or potentially unwanted software.\" <a href=\"https:\/\/t.co\/RWrjjBSWEY\">pic.twitter.com\/RWrjjBSWEY<\/a><\/p>\n<p>\u2014 BleepingComputer (@BleepinComputer) <a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1290413826752618502?ref_src=twsrc%5Etfw\">August 3, 2020<\/a><\/p><\/blockquote>\n<p><span id=\"preservedc388f373dfa4695a7c7179606834e76\" class=\"wlWriterPreserve\"><script src=\"https:\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/span><\/p>\n<p>The above tweet then reveals the insight. If an administrator attempts to block Microsoft websites via the hosts file, Defender will block that and report a security risk. Saving the changes is rejected in the editor with an error message..<\/p>\n<p><img decoding=\"async\" title=\"Fehlermeldung beim Speichern der hosts-Datei\" src=\"https:\/\/i.imgur.com\/p0nFdv7.jpg\" alt=\"Fehlermeldung beim Speichern der hosts-Datei\" \/><br \/>\n(Error message when saving the hosts file, source: Bleeping Computer)<\/p>\n<p>The message indicates that the file contains a virus or potentially unwanted software &#8211; where the hosts is a text file. In any case, the changes cannot be saved. Lawrence Abrams has found the following Microsoft sites, among others, which are not allowed to be entered into the hosts.<\/p>\n<pre><code>www.microsoft.com\r\nmicrosoft.com\r\ntelemetry.microsoft.com\r\nwns.notify.windows.com.akadns.net\r\nv10-win.vortex.data.microsoft.com.akadns.net\r\nus.vortex-win.data.microsoft.com\r\nus-v10.events.data.microsoft.com\r\nurs.microsoft.com.nsatc.net\r\nwatson.telemetry.microsoft.com\r\nwatson.ppe.telemetry.microsoft.com\r\nvsgallery.com\r\nwatson.live.com\r\nwatson.microsoft.com\r\ntelemetry.remoteapp.windowsazure.com\r\ntelemetry.urs.microsoft.com<\/code><\/pre>\n<p>Because then the Defender will sound the alarm and prevent it from saving. Users who wish to maintain these URLs in the hosts file must then define the file in Defender as an exception and exclude it from the check (see also Part 2). In this case, Defender does not monitor any malware manipulation of the hosts file. And that's the missing piece of the puzzle from the user note above. Microsoft is taking targeted action against blocking certain URLs via the hosts file.<\/p>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2020\/07\/30\/windows-defender-markiert-ccleaner-als-pup-teil-1\/\">Windows Defender flags CCleaner as PUP \u2013 Part 1<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/08\/03\/windows-defender-lscht-windows-hosts-datei-teil-2\/\">Windows Defender flags Windows Hosts file as malicious \u2013 Part 2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/08\/04\/defender-blocks-redirected-microsoft-hosts-entries-part-3\/\">Defender blocks redirected Microsoft hosts entries &#8211; Part 3<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Microsoft has begun to block redirects in the Windows native hosts file that affect Microsoft sites in its antivirus products such as Microsoft Defender. The redirects are flagged as malicious (as HostFileHijack). I already mentioned that in part 2 of &hellip; <a href=\"https:\/\/borncity.com\/win\/2020\/08\/04\/defender-blocks-redirected-microsoft-hosts-entries-part-3\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[463,580,2],"tags":[773,47,69],"class_list":["post-15251","post","type-post","status-publish","format-standard","hentry","category-issue","category-security","category-windows","tag-defender","tag-issue","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/15251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=15251"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/15251\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=15251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=15251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=15251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}