- Apr 13, 2013
- 3,224
Nice video! I'm just about to record my test nowA few things:
1). I ran malware from the Desktop- Is this a valid way of testing the product?
Yes it is- I direct you to a comment from MB staff on their forums (found here: Malwarebytes latest video review. )
“ Testing URLs that point to malware is not real-world testing. Typically before a URL pointing to an EXE gets executed, it is tripped by either an Exploit Kit or a JavaScript downloader in a ZIP email attachment. These are the top 2 infection vectors nowadays representing pretty much the vast majority of prevalent malware. If the infection vector is replicated during the test (either visiting an exploit-rigged website or opening the ZIP from an email) these infection vectors would have been blocked by MB3 before the malware was downloaded.”
Note that email attachments are mentioned- an email attachment MUST be saved (usually to Temp) and run locally. So whether a file is saved to and run from Temp or Desktop is trivial. Both are equally valid.
2). about the stuff left behind after the initial scan- These were primarily script based (from the Locky, Cerber, RAA, and Nemucod families). All of the Locky variants were blocked as they could not contact their C&C to download the payload (as mentioned in the MB note above); but the others were able to pass through just like the RAA demonstrated in the video.
3). The Petya file (Original Red flavor) was able to bypass MB but I chose not to dwell on this as it is not really distributed anymore.
Note that email attachments are mentioned- an email attachment MUST be saved (usually to Temp) and run locally. So whether a file is saved to and run from Temp or Desktop is trivial. Both are equally valid.
You do know that is possible to track relationships between processes, right? How do you think process trees can be generated? And yes, it makes a very big difference for MBAE for example if you run a .JS from Word via a macro or from the Desktop by double clicking it.Fleischmann- about the email attachments- when you open, say, a Doc or Excel file that is malicious it will be opened LOCALLY on your system by either Word or Excel; if the attachment is some sort of script it will be processed by wscript also locally. In neither case are the files contained within an email app.
Actually, MB will dismiss your test. Then they will point you to this:Whenever you read a comment from a developer (NOT MB, because they are not stating this!) saying that a test in not valid because the malware should have come from X and not Y, be very cautious as they are trying to Jive you to make up for inadequate protection.
I think they're the best at PUP detection.5 years ago i would have grabbed up a copy of Mbam to clean a system, last couple years, its detection's have been slacking, and are actually very poor. I do not even bother looking at it any more. I just stopped in to watch some of Cruelsisters work
It surprises me that there are apologists for products with inadequate protection.
Any product that touts itself as the PRIMARY security solution for a given system should not have exceptions to what or what not it covers.