Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Trojan horse virus associated with mtex string #2298

Open
GinnyP15 opened this issue Jan 21, 2025 · 1 comment
Open

Trojan horse virus associated with mtex string #2298

GinnyP15 opened this issue Jan 21, 2025 · 1 comment

Comments

@GinnyP15
Copy link

What do you want to do?
Yesterday I started getting trojan horse virus messages when running matlab with mtex 5.11.2. I tried removing mtex and downloading the newer version and during the extraction of the zip file a part of the download was quarantined. I tried this again with a different version with the same result. It means that I am not able to use the code in matlab.

One of our IT support checked out (https://github.com/mtex-toolbox/mtex/blob/mtex-6.0.0/mex/jcvoronoi_mex.mexw64) with a tool called Virus Total and it showed it as having a malicious virus. He thought perhaps someone external could have modified the code to embed the virus.
Microsoft Defender is identifying the offending code as \mtex-6.0.0\mex\jcvoronoi_mex.mexw64 and when I run my code in matlab it also identifies this string as a problem.
I am hoping you can look into this to fix the issue.

Thanks!
Ginny Peterson
What data do you have?

What code do you use?
Please provide minimalist code with code in the following form

% load the data
ebsd = EBSD.load('myFile.txt')

% plot a pole figure
plotPDF(ebsd,Miller(1,0,0,ebsd.CS)

What result do you get

What result do you expect

Error Message
If you get an error message copy and paste it below

put the error message here

What MTEX version do you use?

@kilir
Copy link
Contributor

kilir commented Jan 22, 2025

Hi,
the source code of this function is here https://github.com/mtex-toolbox/mtex/tree/66952fc05de6b841b8ef41f3ba3e0cdb09f3745f/extern/jcvoronoi

You can read it and build it yourself (just remove the binary in question and run mex_install). If your virus detection machine is still striggered, it seems to be broken.

Cheers,
Rüdiger

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants