Ford.p51 wrote in Wed Sep 29, 2021 5:10 pm:The current Flight Gear download is packed with a known Cryptocurrency miner. This is preventing us from updating our older versions of FlightGear, because our organization and many others have safeguards in place to prevent the installation of such malware. Is it possible to update the download without the crypto miner as part of the package?
It looks like a false positive.
Releases are also available at:
https://download.flightgear.org/builds/2020.3/ .
Virus Total results are all clean:
FlightGear-2020.3.11-web.exe: sourceforge (
link), download.flightgear.org (
link)
FlightGear-2020.3.11.exe: download.flightgear.org (
link)
2020.3.11 /bin/fgfs.exe : from my Windows install (
link)
These download.flightgear.org file urls can be put into virus total (not sure the same trick works for sourceforge, as the url goes to a download page). Sourceforge would also put shared files through malware checkers, and maybe upload to virus total - e.g. the installers already had a virus total entry from a while ago.
I'm not sure how a Windows cryptocurrency miner can get into the official release of opensource software(?) - the installers are created in an automated Jenkins build server (
link) and everything should be open/visible.
Do you have a way of confirming this e.g. know of the checker that gives a positive result? It's looks like false positive(?), your IT people should have a look at Virus Total. For a false positive, your IT department should let the developers of the malware checker know. Otherwise you should probably contact the core developers on the fg-devel mailing list.
(Since everything is open, it's also possible for your organisation to build/compile FlightGear yourself - see
link.)
Kind regards