Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Thorium Reader is identifed and detected as a malicious file #2749

Open
rhexor opened this issue Jan 12, 2025 · 2 comments
Open

Thorium Reader is identifed and detected as a malicious file #2749

rhexor opened this issue Jan 12, 2025 · 2 comments

Comments

@rhexor
Copy link

rhexor commented Jan 12, 2025

The latest version of Thorium Reader is identified and detected as a malicious file which erodes confidence is using the app. While it is entirely possible that it may be a false positive, users may be discouraged to use it.

@danielweck
Copy link
Member

Hello, thank you for your feedback. The file you tested is the application installer, which (I suspect) does more than the actual application during its normal operation. That being said, I see that the report also includes information I recognise from Thorium's normal runtime (all of which is open source), so the testing tool seems to also launch Thorium (at least the library window). It would be interesting to test other well-known / well-trusted Electron applications to see if the "malicious" flag is also raised :)

@rhexor
Copy link
Author

rhexor commented Jan 14, 2025

Thanks. There doesn't appear to be a portable version that only includes the executable. Having tested a well-known/trusted Electron app, it isn't identified as malicious in the same way Thorium Reader is. Since many users won't have the experience or skills to review or compile the source code, it would be beneficial for EDR Lab to look into making changes that don't indicate malware like behavior.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants