"So what do you do if instead of quarantining those files, you deleted them?" asked "Bethany." "I bet I'm just screwed."
Quarantined files could be restored, said Telafici, once the corrected DAT was downloaded and installed, but deleted files were another matter. On its Web site, McAfee recommended going to a backup or using Windows XP's System Restore feature to roll back the machine to a point before the flawed DAT.
"We're still looking at what we can do for customers," said Telafici. He wouldn't quantify how many users might have deleted files, and only said that McAfee was working with "some."
However, McAfee has come up with tools to move quarantined files on enterprise machines back to their proper places. The tools have not been posted to its Web site, but will instead be provided to business users through offline support channels.
"But I've never seen anything on this scale," he admitted.
"False positives are actually very common," added Richard Stiennon, chief research analyst at Michigan-based IT-Harvest. "They're particularly common for programs that aren't widely distributed, like some game."
Most of the time the mistaken identity occurs when a security researcher finds a malicious file and tags its filename as belonging to a virus or worm, but doesn't realize that the same filename has been used by a legitimate program.
This should have been caught by McAfee's quality control process, Stiennon said, noting that many of the files netted by VirusScan were commonly-known executables.
McAfee's Telafici acknowledged as much.
"This was a combination of unusual circumstances, Telafici said in explaining what happened. "There was one byte off in a signature, and there was a hole in our testing process."