Advice Request A Question About Shadow Defender

Please provide comments and solutions that are helpful to the author of this topic.

Status
Not open for further replies.

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,510
Not at all SpiderOAK have history change files and you can rollback like snapshot to previous moment.


SpiderOAK looks interesting (5$ /150GB/1 month).
Yet, before making the rollback on the cloud drive, you have to know first that you are infected. If you do not know it, then the malware will survive on the online backup and still can infect the system via synchronization after the reboot.
 

Quassar

Level 12
Verified
Well-known
Feb 10, 2012
585
@Andy Ful
Yes and no....
If he have sync folder with one drive and is inside shadow defender/ malware can get access to modify copy of it in cloud.. but not your files on disk so you can restart system which will wipe infection and you can sync again same files not touched to re-upload them ^^

Problem can be if you have yet connected in real time with yet other devices while malware can use cloud to infect this another devices.. however i dont think so malware will able use backuped files to start it on another system (if user dont open it)
 
  • Like
Reactions: Andy Ful and Wraith

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,510
@Andy Ful
Yes and no....
If he have sync folder with one drive and is inside shadow defender/ malware can get access to modify copy of it in cloud.. but not your files on disk so you can restart system which will wipe infection and you can sync again same files not touched to re-upload them ^^
...
All depends on what you choose to synchronize. For example, you can be infected by the malware that infects all your documents. If you store documents online (including the new documents) because you do not want to commit them in Shadowdefender, then you can be infected after the reboot. There are many scenarios available.

If you think about automatical infection after reboot, that is very improbable in the home environment. But, it is often possible in the targetted attacks via exploiting the firmware of peripherals (sound card, graphics card, printer, network adapter, router, etc.).
 
Last edited:
  • Like
Reactions: Quassar

Quassar

Level 12
Verified
Well-known
Feb 10, 2012
585
Yes exacly that why i said "yes and no" its depend how you configure and how work yuor cloud solution, cause some cloud work different.

Imo stand alone sync broken/infected document like word or PDF don't should harm your system till you don't open infected document again on not secured system/ or it not bypass your security again.
 
  • Like
Reactions: Andy Ful
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top