Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.



  • Please log in to reply
1 reply to this topic

#1 MWhiteside


  • Members
  • 6 posts
  • Local time:03:14 AM

Posted 13 December 2010 - 09:26 AM

I am having a problem with Bloodhound.exploit.343 continuing to come up on my computer. This system is part of a domain and is using the latest version of Symantec EndPoint antivirus security. EndPoint detects the virus and quarantines the program, but the Bloodhound... continues to restart, EndPoint detects and quarintines, and so on. The problem is that the continuous popups from EndPoint that it has detected the virus is happening about every 10 seconds, so it is impossible to use the computer.

The system is fairly new and is running Windows 7 Professional.

BC AdBot (Login to Remove)


#2 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 51,749 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:14 AM

Posted 14 December 2010 - 08:07 AM

Norton (Symantec) has the ability to detect unknown viruses of various types using heuristic algorithms known as Bloodhound Technology. Symantec's technology uses a system to analyze the cataloged behaviors and assess the likelihood of viral infection. Bloodhound is not the name of a virus, but a message displayed by the anti-virus when it thinks it may have found a new virus which is categorized as Exploit in their defintion files.

According to Symantec, Bloodhound.Exploit.343 is a heuristic detection for files attempting to exploit the Microsoft Windows Shortcut 'LNK' Files Automatic File Execution Vulnerability. Under the Technical Details tab, Symantec indicates files that are detected as Bloodhound.Exploit.343 may or may not be malicious and asks that you Submit Virus Samples detected as this threat to the Symantec Security Response Team.

Heuristic analysis is the ability of an anti-virus program to detect possible new variants of malware before the vendor can get samples and update the program's definitions for detection. Heuristics uses non-specific detection methods to find new or unknown malware which allows the anti-virus to detect and stop if before doing any harm to your system. Heuristic scanning methods vary depending on the vendor. Some claim to allow emulation of the file's activities in a virtual sandbox. Others scan the file more intensively, searching line by line inspecting the code in a file to see if it contains virus-like characteristics. If the number of these characteristics/instructions exceeds a pre-defined threshold, the file is flagged as a possible virus.

The disadvantage to using heuristics is that it is not as reliable as signature-based detection (blacklisting) and can potentially increase the chances that a non-malicious program is flagged as malicious. With heuristics, there is always a potential risk for a "False Positive" if virus detection technology (AutoProtect Settings) are set to High for Bloodhound and the heuristic analysis flags a file as suspicious or infected that contains no malware. You may want to Reset Bloodhound to default settings and try scanning again.

Norton is doing its job when alerting to a Bloodhound exploit but from personal experience and testing, I have found some of these alerts to be a false positive. You need to investigate further and follow Symantec's instructions for submitting samples.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users