CA caused some headaches last week after its antivirus software inadvertently flagged part of the Windows OS as malware.The SANS Internet Storm Center reported the problem Friday, saying that an overnight update to CA’s eTrust Antivirus signatures had caused the software to flag a security-related process in Windows as malicious. The faulty update caused some Windows 2003 servers to crash and become unusable, SANS said. The SANS note on this issue can be found here.The problem was that eTrust Antivirus was mistakenly flagging the Windows Lsass.exe process, said Bob Gordon, a CA spokesman. “CA quickly discovered and fixed an issue which temporarily caused some customers to detect a problem in their Lsass.exe files,” he said in an e-mail.According to Gordon, it took CA less than seven hours to fix the mix-up. The problem was introduced in the 30.3.3054 update, released at 2:53 a.m. Eastern Standard Time (EST) and fixed in the 30.3.3056 update, which was issued at 9:34 a.m. EST. CA’s latest updates can be found here. The Lsass.exe process is part of Windows’ security mechanism. So users who had set their eTrust Antivirus to automatically remove malicious software may have found that their systems crashed and were unable to boot up Windows once Lsass.exe was removed.CA’s guidance for users who have been experiencing crashes as a result of the buggy update can be found here. Antivirus software like CA’s uses digital fingerprints, called signatures, to identify malicious software. In this case, eTrust Antivirus apparently mistook Lsass.exe for the Win32/Lassrv.B virus.It is not unheard of for signature files to mistakenly identify legitimate software as malware, but it is remarkable that CA’s software made the mistake with a well-known Windows component, according to Johannes Ullrich, chief research officer at SANS. CA should have been able to detect the problem in its quality-assurance testing, he said.The mix-up apparently did not disrupt a large number of users, but it still reflects poorly on vendors such as CA, Ullrich said. “It’s another loss in trust toward the antivirus business,” he said. “It tells you that the antivirus vendors don’t do the testing.”-Robert McMillan, IDG News Service (San Francisco Bureau)Check out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content brandpost Sponsored by Palo Alto Networks Operational technology systems require a robust Zero Trust strategy in 2024 Zero Trust provides a foundation for creating a stronger security posture in 2024. By Navneet Singh, vice president of marketing, network security, Palo Alto Networks Dec 05, 2023 6 mins Security brandpost Sponsored by AWS in collaboration with IBM How digital twin technology is changing complex industrial processes forever As the use cases for digital twins proliferate, it is becoming clear that data-driven enterprises with a track record of innovation stand the best chance of success. By Laura McEwan Dec 05, 2023 4 mins Digital Transformation brandpost Sponsored by AWS in collaboration with IBM Why modernising applications needs to be a ‘must’ for businesses seeking growth Around one-third of enterprises are spending heavily on application modernisation and aiming for cloud native status. The implications for corporate culture, structure and priorities will be profound. By Laura McEwan Dec 05, 2023 5 mins Digital Transformation opinion 11 ways to reduce your IT costs now Reorienting IT’s budget toward future opportunities is a big reason why CIOs should review their IT portfolios with an eye toward curbing unnecessary spending and realizing maximum value from every IT investment. By Stephanie Overby Dec 05, 2023 11 mins Budget Cloud Management IT Governance Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe