This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

PUA detected: 'SpiGot'

Hi

We have received multiple PUA's on 100 to 150 machines. The detected files are basically java script examples : after.js and background.js

please find the example : PUA detected: 'SpiGot' at 'C:\Users\k113899\AppData\Local\Google\Chrome\User Data\Profile 2\Extensions\lbpcfgdgiemlcaggjhjcinhblflmgdlj\2.2_0\after.js'

 

These detection's came in off business hours and today we might see more users with the same alert. 

 

So my question is did this alert triggered from Sophos end ?

 



This thread was automatically locked due to age.
  • This SpiGot after.js seems to be an epidemic as users upgrade to the new Chrome v69.x.  Hard to believe so many Extensions in the official Google Extension library are infected.  Are we sure this isn't a false warning.

    And no we're not using the Free Tool - Sophos Endpoint w/ Intercept and Central.

     

    Found this thread via Google search.  Need some answers from Sophos!

     

    The folder/files go away easy enough when you remove the extension in Chrome (Settings --> Extensions) but it's a pain for an overworked admin to respond to all these dang warnings!