-
Notifications
You must be signed in to change notification settings - Fork 511
AV detection triggered by encoded string used to execute "Start-EditorServices.ps1" #1831
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Getting the same issue with Avast. It's not giving me any usable logs (or ones I've found yet) to see what it's actually detecting other than the alert notification. The issue just started today it seems; had no issue last night so I'm not sure if it's a definition change or a change within the extension. Being identified as a IDP.HELU.PSE16 - Fileless malware by Avast with definitions 190401-4 & Program version 19.3.2369 (build 19.3.4241.445) |
@Smokex365 Take a look at Script Tracing and if you can enable it: https://docs.microsoft.com/en-us/powershell/wmf/5.0/audit_script That should give you a log of what's running so you can verify. |
For reference, PR #1774 is where this was introduced |
Ya, we know where it was introduced. :-) This change was made for a reason - getting parameters to the startup script can be tricky on Linux. |
Hi all, can you try one of these builds: PowerShell and PowerShell Preview release candidates.zip This should have the AV fix. Note, if you've never used the Preview extension, look at these steps. If you've never installed a VSIX before, here are the steps. |
@TylerLeonhardt Looks good for me, both 1.12.1 and 2..0.0-preview.3 look to be launching using an unencoded string and AV is not triggering upon execution. Thanks for the adjustment! AV vendor's response was "Oh, just filter out the event type", which is what I expected. |
System Details
System Details Output
Issue Description
Upon loading a new instance of VSCode with the Powershell Extension enabled, our AV system alerts on the fact that an encoded string is used to execute the "Start-EditorServices.ps1" file with appropriate parameters. AV reasoning behind the alert is that some malware uses encoded strings as a technique to bypass AV tools.
I'll be following up with AV since this is a new behavior and seems overly aggressive without any sort of additional behavioral context, however adding an option to change this behavior (switch to
-file -param1 -param2
) the Extension side might be worth consideration. Specifically in the event that AV vendors give poor responses to the issue, or more likely, that end-users of the extension will not have an appropriate avenue to even open an issue with vendors that decide to implement this kind of detection/alerting.Expected Behaviour
Actual Behaviour
Attached Logs
The text was updated successfully, but these errors were encountered: