Jump to content

BALTAGY

ESET Insiders
  • Posts

    196
  • Joined

  • Last visited

  • Days Won

    7

Posts posted by BALTAGY

  1. 5 hours ago, itman said:

    Appears the recovery procedure is create a real-time exclusion for the note detection and then remove the note from quarantine to be able to view the note. A bit of a stretch for the average user.

    That's what i'm talking about, also many users won't even know it's a ransomware and could be waiting online for sometime then the ransom will keep downloading other viruses etc until the system freeze and you can't open it and for sure the ransom note also will be gone and you can't use it if the Decryptor require it

    This scenario can easily happen, if the anti-ransomware need to read the ransom note to be triggered then it also can read it and leave it 

  2. 4 minutes ago, Marcos said:

    For forensic analysis for instace when trying to find out how encryption occurred.

    how encryption occurred is not in ransom note, ransom note only contain info how to pay and emails and the important part is the id

    Even if anyone removed the ransomware it self from the system and didn't delete the ransom note it won't do anything but it will help the user to determine the ransom name and version by uploading it to some sites like id ransomware

    I hope you consider leaving the note as it contain an important info and if something wrong happen to the system the user may not be able to recover the files without it like GandCrab it's ransom note is important to recover the files

  3. Just now, Marcos said:

    The user is asked for an action upon detection. While the best would be to detect and log the detection with no cleaning or promting at all, such behavior is not supported. Adding detection without cleaning just for the sake of ransomware notes would be quite expensive in terms of resources.

    Not sure i get what you mean ? Yes the user is asked but if you choose ignore it will keep come up many times until you exclude it or delete it

    I just want to know what the point of delete the ransom note ? it's harmless also if ESET can't detect the ransomware it self and only delete the ransom note after sometime while ransom is running and downloading other viruses etc, the user may not be able to recover the note from quarantine

  4. 10 minutes ago, Marcos said:

    Any file that is cleaned is also quarantined so that users can restore it if necessary. Moreover, ransomware notes are not cleaned automatically in default cleaning mode.

    You mean this option ?
    Snap1.jpg
    Also i know it can be restored but i must disable the protection to restore it

    What the point of deleting it ?

    Here's an example, it's being deleted via database, and here's virus total
    https://www.virustotal.com/gui/file/c65b7b3734f8f42687487c69c50da5ba31915d092ae8bca3ae4d1670300f652c/detection

    _readme.rar

  5. 4 minutes ago, Marcos said:

    Simulation tests do not tell anything about how a particular AV would perform in a real world with actual malware. We don't react to it rather deliberately.

    Isn't these testes act like a real ransomware ? why ESET don't block the operation of encrypting these files ?

  6. I was  just testing the custom scan now and selected "Operating memory,Boot sector, WMI, System registry, Desktop"

    I see some files being scanned too many times like storage.dll in SysWOW64

    And some files took ESET sometime to finish ( i can send one of them if you like )

    Scan finished after 25min

    Did a custom scan again for the C drive ( System Drive ) with Boot sectors and UEFI selected by defaults and scan finished after 5min only

  7. 18 minutes ago, local said:

    can you give me one-two examples when ESET acknowledged an issue and did not blame the customer???

    2 hours ago

    You have 38 posts of complains, if ESET is so bad and there's a free other products are better with 100% protection as you said before, let me ask you again since you ignored to answer every time

    Why you still using ESET if you see it very bad ?

    Are you even using ESET ?

  8. Just now, itman said:

    Then something is wrong with how FireFox is configured. In the latest version of Firefox, it uses the Window root CA certificate store by default. In other words, Eset's root certificate is no longer required to be installed in FireFox's Authorities certificate store.

    I did test v13.0 and v12 all of them have same problem in a clean system only ESET and Firefox

    But once i installed chrome it works fine

    I think ESET need to check it, maybe a module update is needed

  9. Just now, itman said:

    Also if Eset is performing SSL/TLS protocol scanning, any like feature in Adguard should be disabled. Same principal appears here as to use of two real-time scanners together.

    Adguard only block Ads, but since the last v7.4 i see "Your browser is being managed by your organization." in Firefox settings and Adguard certificate is in all sites

    I'm testing only ESET+IDM+Firefox in a clean system and will collect the logs

  10. 12 minutes ago, itman said:

    The only reference I see in IDM relating to AV use is shown below. What does it show on your system?

    Also note that eicar.com and eicar.com.txt are blocked by ESET but not eicar_com.zip or eicarcom2.zip

    Another note that i'm using Adguard and i see Adguard
    certificate in all sites including forum.eset.com

  11. 4 minutes ago, Marcos said:

    Is eicar detected upon download with SSL filtering enabled? https://secure.eicar.org/eicarcom2.zip

    It don't get detected while downloading using Firefox but it get blocked on Chrome

    Update:
    I'm using "Internet Download Manager" and it got detected after i stopped IDM and used Firefox instead

    But in Chrome it get blocked before IDM can catch the link

×
×
  • Create New...