Jump to content

Recommended Posts

Recently I came very close to being taken by PayPal scammers.  Before I wised up they installed Screencollect on my PC.  Later an ESET scan did not find this program evidently because it is a legitimate program used by some folks.

I will never need to install Screencollect or any other programs like it that scammers use.  Is there a blacklist of such programs that I can force ESET to find and quarantine?

Link to comment
Share on other sites

Do you mean ScreenConnect also known as ConnectWise? I can find no reference to Screencollect.

Assuming you mean ScreenConnect, the question is why Eset didn't detect it as a PUA?

Quote

The program under its previous name of ScreenConnect has been used in fraudulent technical support scams where the fraudster is able to gain the control of the victims computer by telephoning and tricking the user to install the software and permitting a connection. The free trial period has been utilized to avoid any software costs in doing this, and similar products such as TeamViewer, AnyDesk and Ammyy Admin have also been used for the scam.[14][15

Cybercriminal group LockBit exploited vulnerabilties in ScreenConnect.[16]

https://en.wikipedia.org/wiki/ConnectWise_ScreenConnect

Do you have both PUA settings plus Suspicious applications settings enabled in Eset real-time protection settings?

Edited by itman
Link to comment
Share on other sites

Well, I just downloaded the ScreenConnect installer and not a detection peep from Eset.

Link to comment
Share on other sites

Sorry for my typing error.  Yes, I meant Screenconnect.  Maybe my ESET product does not have the settings that you mentioned?  I can't find setting references to PUA and suspicious applications.

Link to comment
Share on other sites

3 minutes ago, SilverSurfer said:

I can't find setting references to PUA and suspicious applications.

In this case, the settings don't matter since Eset didn't detect it as such.

The settings are shown in the below screenshot;

Eset_Protections.thumb.png.8d6957f452daba2610f4cdfb11cfa674.png

Link to comment
Share on other sites

5 hours ago, SilverSurfer said:

Now that all my settings are set to "aggressive" do you think ESET would detect Screencollect if it showed up on my PC?

While ESET currently didn't seem to detect this particular program as a PUA, it could be detected as such in the future. 

However, other programs which serve a similar purpose would now most likely be detected as a PUA after the settings you've changed.

Link to comment
Share on other sites

Let's discuss why ScreenConnect is a "potentially dangerous app."

Quote

Two days after an international team of authorities struck a major blow to LockBit, one of the Internet’s most prolific ransomware syndicates, researchers have detected a new round of attacks that are installing malware associated with the group.

The attacks, detected in the past 24 hours, are exploiting two critical vulnerabilities in ScreenConnect, a remote desktop application sold by Connectwise. According to researchers at two security firms—SophosXOps and Huntress—attackers who successfully exploit the vulnerabilities go on to install LockBit ransomware and other post-exploit malware. It wasn’t immediately clear if the ransomware was the official LockBit version.

“We can't publicly name the customers at this time but can confirm the malware being deployed is associated with LockBit, which is particularly interesting against the backdrop of the recent LockBit takedown,” John Hammond, principal security researcher at Huntress, wrote in an email. “While we can't attribute this directly to the larger LockBit group, it is clear that LockBit has a large reach that spans tooling, various affiliate groups, and offshoots that have not been completely erased even with the major takedown by law enforcement.”

Hammond said the ransomware is being deployed to “vet offices, health clinics, and local governments (including attacks against systems related to 911 systems).”

https://arstechnica.com/security/2024/02/ransomware-associated-with-lockbit-still-spreading-2-days-after-server-takedown/

Proof of concept scenario.

1. Attacker phish's target to download and install a vulnerable version of ScreenConnect. He then exploits the remote code execution vulnerability to deliver ransomware, infostealer, you name it malware.

2. Attacker "tricks" target to download and install a vulnerable version of ScreenConnect; e.g. SEO poisoning, etc..

Edited by itman
Link to comment
Share on other sites

Now for the really weird stuff.

If you refer to this current forum posting: https://forum.eset.com/topic/41631-screenconnect-connect-wise-eset-blockigs/?do=getNewComment , Eset does detect ScreenConnect as a PUA!

When I downloaded the ScreenConnect installer, I didn't run it. Hopefully, Eset would detect it once installed, but that isn't really the way to do so.

It is possible what got installed on your device is an unknown undetected variant of ScreenConnect.

Most likely, Eset didn't alert you about ScreenConnect is because you had Potentially Unwanted App detection disabled.

Edited by itman
Link to comment
Share on other sites

3 hours ago, itman said:

Now for the really weird stuff.

If you refer to this current forum posting: https://forum.eset.com/topic/41631-screenconnect-connect-wise-eset-blockigs/?do=getNewComment , Eset does detect ScreenConnect as a PUA!

When I downloaded the ScreenConnect installer, I didn't run it. Hopefully, Eset would detect it once installed, but that isn't really the way to do so.

It is possible what got installed on your device is an unknown undetected variant of ScreenConnect.

Most likely, Eset didn't alert you about ScreenConnect is because you had Potentially Unwanted App detection disabled.

Might be specific versions of the program that are flagged

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...