A problematic signature file pushed out by Panda Security on Wednesday caused some legitimate files to be detected as malicious and moved to quarantine.
According to the antivirus firm, the issue affected both home and enterprise customers using products such as Panda Cloud Office Protection, Panda Cloud Office Protection Advanced, Panda Antivirus Pro 2015, Panda Internet Security 2015, Panda Global Protection 2015, and Panda Gold Protection.
After users applied the buggy update, the security solutions started detecting various files, including Windows system, application and even Panda files, as malware. The files were quarantined, making some applications unusable.
“An automated update published yesterday unexpectedly resulted in Panda protection detecting and neutralising several files on some systems,” Panda Security told SecurityWeek via email. “The issue was quickly detected and a corrected signature file released. PandaLabs and the development teams immediately began working on a process and tools that will help rectify any system issues. However, in certain environments it is possible for the incident to persist.”
After learning of the botched update, Panda advised users not to restart their computers while the issue was being addressed. However, many enterprise customers rebooted their devices before seeing the warning. One Panda Cloud Office Protection customer reported that the problem affected more than 3,000 PCs. Others complained about the financial impact of this incident.
In an advisory published on its website, the company advises users to enter the Windows command prompt; stop the psinprot, psinaflt and nanoservicemain services using the “sc stop” command; and run the Panda Security recovery tool (ps-recovery.exe) as administrator. If the buggy update affected the operating system and the computer cannot log in to Windows, the steps must be carried out from Safe Mode.
Buggy updates are not uncommon. A botched IPS definition package released by Symantec in February for various Norton products caused the Internet Explorer browser to crash.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
- Security Update for Chrome 109 Patches 6 Vulnerabilities
- New Open Source OT Security Tool Helps Address Impact of Upcoming Microsoft Patch
- Forward Networks Raises $50 Million in Series D Funding
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
