ESET and zero - day threats

Status
Not open for further replies.

Piteko21

Level 18
Thread author
Verified
Top Poster
Well-known
Sep 13, 2014
874
hi, I've been thinking ... and how ESET products block zero - day threats?

they have good signatures and they are quick to include new threats in their updates, but I just know little about their technologies and capabilities.


KASPERSKY HAVE THIS (technologie):

Key Features
Core Protection
  • Real-time Protection from new and emerging viruses, spyware, and more
  • Proactive Detection of unknown malware & rollback of harmful activity
  • Instant Safety Checks for files and websites
  • Automatic Exploit Prevention ensures vulnerabilities won't compromise your PC
  • Hybrid Protection combines the power of the cloud and your PC
  • Small, Frequent Updates
Identity Protection
  • Anti-Phishing protects your digital identity
  • Quick Launch of Virtual Keyboard defeats keyloggers & screen capture malware
  • Secure Keyboard protects personal data entered via a physical keyboard
Performance
  • iChecker/iSwift provide intelligent scanning for maximum performance
  • Smart Updates reduce network traffic and resource use
  • Gamer Mode for an uninterrupted gaming experience
Advanced Protection
  • Safe Money protects data during online financial transactions
  • Two-way Firewall blocks hacker attacks
  • Application Control prevents dangerous applications from harming your system
  • Safe Surf alerts you to potentially malicious web sites
  • URL Advisor informs about reputation of web links
  • Anti-Blocker functionality helps unblock your PC if it’s infected with a ransom-ware Trojan.
  • Trusted Applications Mode to ensure only trusted applications run on your PC
  • Network Attack Blocker prevents malicious network attacks
  • Anti-Banner blocks dangerous & annoying banner ads
  • Robust Anti-Spam protection
  • Advanced Parental Control keeps your kids safe & responsible online
Additional Features
  • Rescue CD cleans your system if its infected beyond use
  • Technical Support via phone, live chat, email, & Knowledge Base



...and ESET :



Exploit Blocker
Exploit Blocker is designed to fortify application types on users’ systems that are often exploited, such as web browsers, PDF readers, email clients or MS Office components. It adds another layer of protection one step closer to attackers by using a technology that is completely different to techniques that focus on detection of malicious files themselves.

Instead, it monitors the behavior of processes and looks out for suspicious activitiesthat are typical for exploits. When triggered, the behavior of the process is analyzed and, if considered suspicious, the threat may be blocked immediately on the machine, with further metadata about the attack being sent to our LiveGrid® cloud system. This information is further processed and correlated, which enables us to spot previously unknown threats, so called zero-day attacks, and provides our lab with valuable threat intelligence.



Java Exploit Blocker
Java Exploit Blocker uncovers attempts to take advantage of weaknesses in Java.It keeps a constant lookout over processes for any signs of suspicious activity or behavior. Threats are blocked and the fingerprint is sent to ESET LiveGrid® cloud system to ward off future attacks.

Related products - Exploit Blocker and Java Exploit Blocker Technologies

Botnet Protection
Botnet protection provides another, network-based layer of detection to reveal possible running threats.

It searches outgoing network communications for known malicious patterns, and matches the remote site against a blacklist of malicious ones. Any detected malicious communication is blocked and reported to the user.



Advanced Memory Scanner
Advanced Memory Scanner couples nicely with Exploit Blocker, as it is also designed to strengthen protection against modern malware. In an effort to evade detection, malware writers extensively use file obfuscation and/or encryption. This causes problems with unpacking and can pose a challenge for common anti-malware techniques, such as emulation or heuristics. To tackle this problem, the Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in the memory. This allows for effective detection of even heavily obfuscated malware. Unlike Exploit Blocker, this is a post-execution method, which means that there is a risk that some malicious activity could have been performed already. However, it steps into the protection chain as a last resort when everything else fails.



Vulnerability Shield
Vulnerability shield is an extension of firewall and improves detection of known vulnerabilities on the network level.

By implementing detection for common vulnerabilities in widely used protocols, such as SMB, RPC and RDP, it constitutes another important layer of protection against spreading malware, network-conducted attacks and exploitation of vulnerabilities for which a patch has not yet been released or deployed.



ESET LiveGrid®
Built on our ThreatSense.NET® advanced early warning system, ESET LiveGrid® utilizes data that ESET users have submitted worldwide and sends it to ESET's Malware Research Lab.

By providing suspicious samples and metadata from the wild, ESET LiveGrid® is a vital feedback system that enables us to react immediately to the needs of our customers and adaptto the latest threats. ESET malware researchers use the information to build an accurate snapshot of the nature and scope of global threats, which helps us focus on the right targets. ESET LiveGrid® data plays an important role in setting priorities in our automated processing.

Moreover, it implements a reputation system that helps to improve the overall efficiency of our anti-malware solutions. When an executable file or archive is being inspected on a user’s system, its hashtag is first compared against a database of white- and blacklisted items.

If it is found on the whitelist, the inspected file is considered clean and also flagged to be excluded from future scans. If it is on the blacklist, appropriate actions are taken – based on the nature of the threat. Only if no match is found is the file scanned thoroughly. Based on the results of this scan the file becomes a candidate for addition to one of the two lists. This approach has a significant positive impact on scanning performance.

This reputation system allows for effective detection of malware even before signatures are delivered to users’ computers via our virus signature database update (which happens several times a day).




Anti-Phishing

Anti-Phishing technology protects you from attempts to acquire passwords, banking data and other sensitive information by fake websites, masquerading as legitimate ones.

When a user’s computer attempts to access a URL, ESET systems compare it against our database of known phishing sites. If a match is found, connection to the URL is aborted and a warning message is displayed. At this point, the user has the option to proceed to the URL at his/her own risk or report the URL to us as a potential false positive warning.

The Anti-phishing database is updated by ESET regularly (users’ computers receive data about new phishing threats every 20 minutes).

Along with this straightforward approach, ESET Anti-Phishing implements specific proactive algorithms. These inspect the visual design of websites in an effort to eliminate those mimicking their genuine counterparts. This approach is used to detect, for example, fake internet banking forms.



Malware sample processing
ESET’s Security Research Lab receives many infected samples from various sources every day.Sample submissions from customers, distributors and partners (sent to samples@eset.com) are an important source of new malware.

Other sources include sample exchange or active honey pots, for example. After being pre-processed by automated algorithms, the received samples are reviewed by a team of detection engineers and malware analysts. Their job is to decide whether the submitted file or URL is malicious, and if it is, to create a suitable detection signature or algorithm for it.

There are several types of detection signatures and the detection engineer has to choose the most effective one depending on the characteristics of the malware. Newly created signatures are then packed together and released to our users in the form of a Virus Signature Database Update. These updates are rolled out several times a day, 24-7-365.



Signature types
ESET’s scanning engine uses several types of detection signatures for detecting malicious objects (files, processes, URLs, etc.).

The signature types range from very specific hashes (useful, for example, in targeting specific malicious binaries, specific versions of malware, for statistical purposes, or simply for giving a more precise detection name to a malware that we have been detecting heuristically) to DNA-based Smart Signatures, which are rather complex definitions of malicious behavior and malware characteristics. These signatures also rely on heuristics and emulation to evaluate the scanned sample.

The strength of ESET’s proactive detection lies in the Smart DNA signatures. They mean that the detection is effective, as well as efficient – a single well-crafted signature can detect thousands of related malware variants and enables our antivirus software not only to detect malware that we already know of, or have seen before, but also new, previously unknown variants.




Cleaning
When a computer is infected with malware, it will usually suffice to delete the detected file(s) in order to clean the infected system. But in certain cases – for example when the malware has modified operating system files, tampered with the system Registry or when a parasitic virus has infected the user’s own files – the situation gets more complicated. Simply deleting the infected file could cause data loss or even render the computer unbootable.

Therefore, a different approach – cleaning or disinfection of the infected files – has to be taken. In most such cases the cleaning is performed directly by the installed antivirus. Exceptionally, however, the disinfection steps are too complex or simply too dangerous (system stability-wise) and we may opt to release standalone cleaners for this purpose. These are available free of charge, also for non-customers.


Advanced Heuristics
Advanced Heuristics is one of the technologies used for proactive detection. It provides the ability to detect unknown malware based on its functionality through emulation. The latest version introduces a completely new way of code emulation based on binary translation.

This new binary translator helps to bypass anti-emulation tricks used by malware writers. Along these improvements, DNA-based scanning has also been extended significantly. This allows for better detections which address current malware more accurately.


What is livegrid in real life,is cloud protection???


she can stop me from opening an infected file when there are no signatures ? she ( technologie) is effective?

ESET LIVEGRID is like ( KSN ) KASPERSKY?
 

nissimezra

Level 25
Verified
Apr 3, 2014
1,460
ESET seems to have better signature but when it comes to unknown it just let it through.
it is lighter.

I'm using ESET but I think qihoo has better protection to unknown threat.

i wouldnt buy any AV when 360IS is around
 

Piteko21

Level 18
Thread author
Verified
Top Poster
Well-known
Sep 13, 2014
874
ESET seems to have better signature but when it comes to unknown it just let it through.
it is lighter.

I'm using ESET but I think qihoo has better protection to unknown threat.

i wouldnt buy any AV when 360IS is around
ESET seems to have better signature but when it comes to unknown it just let it through.
it is lighter.

I'm using ESET but I think qihoo has better protection to unknown threat.

i wouldnt buy any AV when 360IS is around



THANKS for your opinion:) my doubt is how ESET react face an unknown (and malicious)file.
 
  • Like
Reactions: nissimezra

Piteko21

Level 18
Thread author
Verified
Top Poster
Well-known
Sep 13, 2014
874
OH,so his proactive protection to unknown files is weak.


Mod Edit: Please do not use foul language.
 
Last edited by a moderator:
  • Like
Reactions: nissimezra

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
ESET as a matured technology for having fast response on zero day protection and with their Incorporste Live Grid it can determine the file by cloud even though not detected/added by their signatures/heuristics.
 

darko999

Level 17
Verified
Well-known
Oct 2, 2014
805
ESET is great overall, if you scary of zero day threats unistall the damn windows. People with lo brain signatures won't be protected from their ignorance, even if they are disconnected from internet they will mess something up. ESET is for people with a brain, plain simple.
 

Piteko21

Level 18
Thread author
Verified
Top Poster
Well-known
Sep 13, 2014
874
ESET is great overall, if you scary of zero day threats unistall the damn windows. People with lo brain signatures won't be protected from their ignorance, even if they are disconnected from internet they will mess something up. ESET is for people with a brain, plain simple.


have a brain today is important and have a good antivirus, I agree:D:D:D
 

nsm0220

Level 21
Verified
Sep 9, 2013
1,054
ESET is great overall, if you scary of zero day threats unistall the damn windows. People with lo brain signatures won't be protected from their ignorance, even if they are disconnected from internet they will mess something up. ESET is for people with a brain, plain simple.
you know no OS is foolproof to malware and besides there better avs and programs that are better then eset in terms of zero day protection
 

nissimezra

Level 25
Verified
Apr 3, 2014
1,460
eset is useless when it comes to protecting system 32 and other important windows files
i saw your video. having a file in system32 doesn't mean that the pc is infected. in your case the file wasn't running in memory. you should've check if startup entry was added ir task that activate the file.
other than that i agree.
 

Cch123

Level 7
Verified
May 6, 2014
335
ESET has a mature malware lab infrastructure that enables it to detect most zeroday threats within hours. Personally, when I submit undetected malware files to vendors, I realise that ESET is the fastest vendor to respond with new detections. However, before that, ESET already has good features (e.g. HIPS) that enable you to stop most zeroday threats. They are not configured to be activated on default though, because of the risks of false positives.

To get a good zeroday protection out of ESET, you need to do quite some manual configuration. This is a guide written by Umbra on configuring ESET: http://malwaretips.com/threads/how-to-set-eset-smart-security-for-max-protection.14466/
Also, here are some HIPS rules from Manzai: http://malwaretips.com/threads/eset-smart-security-7-manzaitest.27720/

A well configured ESET HIPS and firewall is very powerful. Personally, I once tested ESET with HIPS rules that I created myself and firewall on interactive mode in a VM. Even with its scanner disabled, it blocked almost all malicious samples. Testing with live exploits (including the memory only payload from angler exploit kit), it could block most too. If you need more help with HIPS, there are many people here on this forum that can help :)
 

nsm0220

Level 21
Verified
Sep 9, 2013
1,054
ESET has a mature malware lab infrastructure that enables it to detect most zeroday threats within hours. Personally, when I submit undetected malware files to vendors, I realise that ESET is the fastest vendor to respond with new detections. However, before that, ESET already has good features (e.g. HIPS) that enable you to stop most zeroday threats. They are not configured to be activated on default though, because of the risks of false positives.

To get a good zeroday protection out of ESET, you need to do quite some manual configuration. This is a guide written by Umbra on configuring ESET: http://malwaretips.com/threads/how-to-set-eset-smart-security-for-max-protection.14466/
Also, here are some HIPS rules from Manzai: http://malwaretips.com/threads/eset-smart-security-7-manzaitest.27720/

A well configured ESET HIPS and firewall is very powerful. Personally, I once tested ESET with HIPS rules that I created myself and firewall on interactive mode in a VM. Even with its scanner disabled, it blocked almost all malicious samples. Testing with live exploits (including the memory only payload from angler exploit kit), it could block most too. If you need more help with HIPS, there are many people here on this forum that can help :)
but you see most users are set it and forget type and besides no one can't keep with malware anymore that's why zero day protection is very important and you fanboys should know that eset hips are turn off by default which why is it off as well
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top