Jump to content

McMcbrad

Members
  • Posts

    13
  • Joined

  • Last visited

Posts posted by McMcbrad

  1. 1 hour ago, peteyt said:

    While I completely agree with your statement, nothing can be 100 percent, but does that mean we shouldn't put in things to try and stop it? By that logic couldn't we argue that why bother with protection if some kind of malware could theoretically be designed to bypass or disable an AV (yes I know my comparison is slightly different to the issue we are talking about and AVs have tech to stop these).

    I do think we will see a lot more people requesting a folder system for ransomware protection. As mentioned before I'd love to see a better system for advanced users for warning them about files with no to low reputation. I get that eset doesn't want to cause issues and confusion for average users but surely that shouldn't mean the more advanced users should go without. Just make it harder to find and enable these things and make it clear when enabling the risks.

    Warning them about files with no to low reputation is great, but that works on products like Norton, McAfee, Kaspersky...Every new executable has low reputation by default, unless it "proves" itself trusted. ESET by default gives these files a chance. This is not a bad strategy but it should be paired with effective BB (or as you call it here DBI), sandbox and more. You can't just rely that static machine learning and dynamic emulation will be good enough to stop everything.

  2. Protected folders is definitely not a magical thing with many potential bypasses, but it's still something worth implementing and it doesn't require any complex engineering from ESET's side, as it can step on the foundation of HIPS. 

    File journaling is a much more effective method of keeping user data safe. I don't know how your endpoint products work, this is the first time I am trying ESET, but if they lack journaling too... don't envy corporations relying on you. 

    Your reaction time to the threat was ~3 hours, whilst this is lower than others, it's enough to cause harm.

    The fact that you will provide proactive protection against this particular piece of ransomware is not too calming, more generic approaches are needed.

  3. I am new to ESET's engine and categorisation system, I am used to deny-by-default systems where every executable outside of the whitelist or deviating from a training set with trusted executables is considered malicious. ESET has implemented an allow-by-default system where every executable is considered trusted, unless afterwards proven to be malicious. 

    I was not aware that reputation makes little difference in ESET's classification process, hence I have named the thread this way. Furthermore, my question was not how LiveGrid data was utilised in the product, because I already know that. This is not something unique for ESET, others have been doing it for ages too. My question was why a brand new piece of malware has MEDIUM reputation, which was then answered by staff.

    However, now that we've learned that reputation plays no vital role in protection, shall we move on saying that ESET's ransomware protection can be improved in other ways? 

    Let me repeat these ways again:

    1. List of "protected" folders, where only executables with HIGH reputation or digital signature from a trusted vendor can perform changes.

    2. Journaling system that works for these folders, copying files and then restoring them in case 1 has failed and ransomware behaviour has been exhibited by any process, be it a highly trusted one.

  4. The fact that malware could inject into trusted process can be mitigated in other ways. Creating a HIPS rule that allow only certain apps to access certain folders is madness. Can you list all apps that I have to add to this list? This is a paid product and securing people is your job. It's not their own job to add HIPS rules. That's why we are paying you. If I wanna write HIPS rules I will come join your team.

  5. This is a very unfriendly way of doing it. Majority of users think trojan horse is one virus and not a whole family. 

    Also if you add rule in HIPS, this will either allow/block the action or it will ask the user whether or not they allow modifications. None of these ways stops only UNTRUSTED executables from making modifications. 

    And it still doesn't give the option for journaling these important files. 

  6. Then in that case other protection technologies need to be improved, as I will repeat it again. The sample was missed with quite aggressive machine learning settings in place and my system got encrypted, meaning HIPS, as well as DBI have all failed. Whilst this is a test system and controlled environment, a standard user might come across this sample. Do you believe that user will be protected?

  7. Hi,

    I am a malware hunter and I've come across an interesting ransomware sample, which I've also uploaded to you. 

    image.png.9ec581f1543ae9c0364983bbe2ff58f0.png

     

    What I am curious to know is how a brand new and unknown, unsigned executable with low number of users gets half-way good reputation? Not only all of your technologies failed to stop the encryption on my test, but also your reputation system seems a bit... funny to say it in a polite way.

    I am expecting a response from STAFF and not anyone else. 

×
×
  • Create New...