Team OS : Your Only Destination To Custom OS !!

Welcome to TeamOS Community, Register or Login to the Community to Download Torrents, Get Access to Shoutbox, Post Replies, Use Search Engine and many more features. Register Today!

Tech News Microsoft now flags HOSTS files that block Windows 10 telemetry

Microsoft has introduced another change to Windows 10 users. If you are using the HOSTS file to block Windows 10 telemetry or updates, Microsoft Defender will flag its as a malicious, and show a severe level alert.

Actually, it is not big news. It is a well known fact that Windows 10 doesn't use the HOSTS file to resolve addresses to certain Windows servers. The new thing is the changed behavior of Microsoft Defender.
The Hosts file is just a regular text file which can be modified using any text editor. The only catch is that the editor app should be started elevated (as Administrator). The hosts file is located in the system directory, so non-elevated apps will fail to save it.
The Hosts file consists of lines of text. Each line must include an IP address in the first text column followed by one or several host names. Text columns are separated from each other by white space. For a historical reason, <Tab> is often preferred, but spaces will also do the trick. Lines started with a hash character (#) are comments. Windows ignores blank in the hosts file.
After you put Microsoft's servers in the HOSTS file in order to get them resolved as, let's say 127.0.0.1, i.e. to stop the OS accessing the actual servers, Microsoft Defender will prevent you from saving that file, and will display the following dialog.

PuodMe.jpg


Notice SettingsModifier:Win32/HostsFileHijack, it is a new, dedicated category for the modified file. It seems that Microsoft had recently updated their Microsoft Defender definitions to detect when their servers were added to the HOSTS file.

As BleepingComputer reports, the following lines in HOSTS will trigger detection:​

microsoft.com
telemetry.microsoft.com
wns.notify.windows.com.akadns.net
v10-win.vortex.data.microsoft.com.akadns.net
us.vortex-win.data.microsoft.com
us-v10.events.data.microsoft.com
urs.microsoft.com.nsatc.net
watson.telemetry.microsoft.com
watson.ppe.telemetry.microsoft.com
vsgallery.com
watson.live.com
watson.microsoft.com
telemetry.remoteapp.windowsazure.com
telemetry.urs.microsoft.com

If you decide to clean this threat, Microsoft will restore the HOSTS file back to its default contents.Well, modifying the HOSTS file can be a bad idea if it is done in an improper way, or has been done by malware. However, for users who actually know what they are doing, it is just another restriction that leaves even less control of the OS in users' hands.​
 

*Maestro*

Power User
Member
Downloaded
368.9 GB
Uploaded
81.8 TB
Ratio
226.97
Seedbonus
711,487
Upload Count
0 (0)
Member for 9 years
Thank you @Gollapudi
This is a very interesting read.
 

mkrleza

Si non confectus, non reficiat
Uploader
✅ Verified Member
Member
Downloaded
654.9 GB
Uploaded
65.9 TB
Ratio
103.06
Seedbonus
5,288,690
Upload Count
7 (7)
Member for 7 years
I did not know that. The Evil Empire (MS) strikes again...
 

LauRoman

Member
Downloaded
6.5 GB
Uploaded
168.1 GB
Ratio
25.96
Seedbonus
390
Upload Count
0 (0)
Member for 6 years
So you're saying Microsoft is flagging attempts to blacklist their servers that include definitons and cloud scanning of files?
 

Tonee Lim

✅ Verified Member
Member
Downloaded
2 TB
Uploaded
21.1 TB
Ratio
10.34
Seedbonus
540,327
Upload Count
0 (0)
Member for 6 years
I wonder what's going to be the workaround for this...seems this will lead eventually to a monopolizing overlord system where MS will be in the driver's seat for both the good, the bad and the money :D
 

Cyler

🤴 Super Admin
⚡OS Master
Downloaded
510.5 GB
Uploaded
24.5 TB
Ratio
49.16
Seedbonus
27,587
Upload Count
1 (1)
Member for 6 years
Come on guys, its not the end fo the world. First of all, I think that this will only pop up when a user initiates a full scan and not on everyday activity, I hope at least. Second its easy to deal with from what it sounds.

Just make 2 cmd files to run as an administrator, one named backup.cmd and the other restore.cmd

Backup.cmd
contents
copy C:\Windows\System32\drivers\etc\hosts C:\Windows\System32\drivers\etc\hosts.bkp

Restore.cmd contents
copy C:\Windows\System32\drivers\etc\hosts.bkp C:\Windows\System32\drivers\etc\hosts

Run backup before the scan, and restore right after. 2 extra clicks.

Additionally, tho I can't test this yet, you could also block the System account from having access to the host file.
  • Right-click on hosts file go to properties.
  • Go to the Security tab.
  • Under Groups and users go to the System and edit permissions.
  • Deny write permissions for the System.
  • Press OK and Done.
If the System account is blocked, the Windows defender won't be able to do any changes.
 
Last edited:

MniawY

• STAFF™ 🌟
Super Moderator
Uploader
Power User
Downloaded
156.5 GB
Uploaded
51 TB
Ratio
333.82
Seedbonus
1,328,836
Upload Count
104 (102)
Member for 7 years
Thanks For The Info @Gollapudi :)
 

pascalwil

✅ Verified Member
Member
Downloaded
1.3 TB
Uploaded
36.2 TB
Ratio
28.55
Seedbonus
21,951
Upload Count
0 (0)
Member for 8 years
Thank you for the info
 

RedDove

⭐ VIP
Power User
✅ Verified Member
Member
Downloaded
118.2 GB
Uploaded
41.8 TB
Ratio
362.54
Seedbonus
1,857,149
Upload Count
0 (0)
Member for 9 years
All I can do is shake my head.
even when something pays for the OS
and owns it legit, they still feel as though
they can tell you what you can or cannot do with/to your property.
bunch of control freaks, and WD, a big pain in the you know what.
 
Top