Starting this weekend Chrome browser is flagging the download remote support as dangerous. I checked the SSL cert (active), I checked the app signatures, Simple Help LTD.
Anyone else seeing this?
Thanks
Starting this weekend Chrome browser is flagging the download remote support as dangerous. I checked the SSL cert (active), I checked the app signatures, Simple Help LTD.
Anyone else seeing this?
Thanks
We’re seeing this today as well. Last week was all good.
And Chrome has a very convoluted way of getting at the download:
→ Go to the Chrome menu (three dots)
→ Choose “Downloads”
→ Find the blocked download and click on the three dots
→ Choose “Download dangerous file”
Not great for customer facing stuff, but I also get that this is a Google/Chrome thing, and not necessarily SimpleHelp’s fault.
We have seen BitDefender flagging our installed Remote Access packages as malicious, and blocking access to our server for heart-beat check-ins.
Well this is an issue for simple help, how does Team viewer, Anydesk, and a range of other products avoid this issue? I get it, many of us host our own servers and there probably are cases where this system was used as an attack vector but punish all of us? Remote support will probably go the way of EV code signing where you have to give blood samples and an insurance policy to operate.
I also happens with Sophos : we sent the exe to be trusted to Sophos - but its a nightmare
also getting blocked / removed from installs is the Launcher
currently C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access Bundle-00121629388\JWrapper-Remote Access-00121629388-complete\Remote AccessWinLauncher.exe
we keep excluding the whole folder still it comes back after each update
Hello…Did you ever hear back from Sophos on this issue? We have over 600 Sophos Endpoints and this is proving to be quite painful. Did you try to exclude the RemoteAccessWinLauncher?
yes they said just to exclude it in the global policy - which has been working