Community


[ Closed ] [Resolved] ESET Blocking non https cloudfront communication with Viewer 7.5.1.0

Links used in this discussion
Trent, User (Posts: 59)
Sep 25, 2024 4:59:52 pm EDT
Support level: Free or trial
Probably related to a couple other posts on the forum, I got a popup from my ESET Antivirus that it blocked the communication to http://d31w5wvwqc1c0w.cloudfront.net

I'm assuming it's probably that it is trying to use http rather than https that's causing the block.

This does not prevent functionality of RU, but just thought I would let you know.  

Possible related posts:
https://www.remoteutilities.com/support/forums/forum1/2834-please-update-the-simple-update-to-download-from-https-and-not-http

https://www.remoteutilities.com/support/forums/forum1/2832-is-update-remoteutilities-net-legit
Attached Files
[Resolved] ESET Blocking non https cloudfront communication with Viewer 7.5.1.0
Conrad Sallian, Support (Posts: 3013)
Sep 25, 2024 5:58:22 pm EDT
Hello Trent,

Thank you for the report.

However, the update has always worked that way, so it's strange that ESET suddenly decided to block that connection for this reason. Perhaps either their settings or policy have changed.

In this case, I would recommend contacting ESET to report the issue. You can reach their lab via email at samples@eset.sk, or, even better, post a message on their community forum: https://forum.eset.com/. If you are their customer, they are obligated to respond promptly and explain their actions.

Please, note that ESET might offer various explanations for not addressing the issue. These often sound like, "This program has been used in malicious activity" (in which case, ask them how a signed vanilla executable/installer is to blame for such activity). After all, there isn't a single remote access tool on the market that hasn't been used maliciously or for fraud activities.

Or they might say, "It was compromised" (compromised how? If the certificate was compromised, it should have been revoked, but it's still active). Lastly, they could claim, "It is used in cyberattacks as part of malware"—but isn’t it their responsibility to combat wrappers, droppers, and all sorts of 'ers,' while leaving legitimate (i.e., digitally signed) software intact?

Another favorite excuse of virtually any antivirus company is: "It violates the CSA guidelines." A simple question like, "Which specific CSA guideline does it violate?" usually results in frustration and an answer along the lines of, "We say it's a threat because we say so."
Conrad Sallian, Support (Posts: 3013)
Sep 26, 2024 4:43:22 pm EDT
Hello Trent,

Could you please check if simple update works for your Hosts now? Thanks.
David Goldman, User (Posts: 4)
Sep 28, 2024 1:09:29 pm EDT
I'm having the same BLACKLIST error with my clients running AVG Antvirus, and attempting to run remote simple update for the host program upgrade
Attached Files
[Resolved] ESET Blocking non https cloudfront communication with Viewer 7.5.1.0
Conrad Sallian, Support (Posts: 3013)
Sep 28, 2024 1:14:27 pm EDT
Hi David,

Thank you. Let's keep a single thread for this issue, please.
Conrad Sallian, Support (Posts: 3013)
Sep 28, 2024 1:15:05 pm EDT
By the way, ESET informed us that the issue has been resolved and they removed the block. Closing this topic.

* Website time zone: America/New_York (UTC -4)