Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Buggy Panda Update Causes Problems for Home, Enterprise Users

A problematic signature file pushed out by Panda Security on Wednesday caused some legitimate files to be detected as malicious and moved to quarantine.

A problematic signature file pushed out by Panda Security on Wednesday caused some legitimate files to be detected as malicious and moved to quarantine.

According to the antivirus firm, the issue affected both home and enterprise customers using products such as Panda Cloud Office Protection, Panda Cloud Office Protection Advanced, Panda Antivirus Pro 2015, Panda Internet Security 2015, Panda Global Protection 2015, and Panda Gold Protection.

After users applied the buggy update, the security solutions started detecting various files, including Windows system, application and even Panda files, as malware. The files were quarantined, making some applications unusable.

“An automated update published yesterday unexpectedly resulted in Panda protection detecting and neutralising several files on some systems,” Panda Security told SecurityWeek via email. “The issue was quickly detected and a corrected signature file released. PandaLabs and the development teams immediately began working on a process and tools that will help rectify any system issues. However, in certain environments it is possible for the incident to persist.”

After learning of the botched update, Panda advised users not to restart their computers while the issue was being addressed. However, many enterprise customers rebooted their devices before seeing the warning. One Panda Cloud Office Protection customer reported that the problem affected more than 3,000 PCs. Others complained about the financial impact of this incident.

In an advisory published on its website, the company advises users to enter the Windows command prompt; stop the psinprot, psinaflt and nanoservicemain services using the “sc stop” command; and run the Panda Security recovery tool (ps-recovery.exe) as administrator. If the buggy update affected the operating system and the computer cannot log in to Windows, the steps must be carried out from Safe Mode.

Buggy updates are not uncommon. A botched IPS definition package released by Symantec in February for various Norton products caused the Internet Explorer browser to crash.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Endpoint Security

Gigabyte has announced BIOS updates that remove a recently identified backdoor feature in hundreds of its motherboards.

Endpoint Security

Several major companies have published advisories in response to the Downfall vulnerability affecting Intel CPUs.

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Endpoint Security

The Zero Day Dilemma

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.

Endpoint Security

When establishing visibility and security controls across endpoints, security professionals need to understand that each endpoint bears some or all responsibility for its own...