- Jul 13, 2014
- 766
Research presented at Black Hat conference contends that at least four antivirus companies’ products use cloud sandboxes that could be exploited by malware to send out data undetected across the internet.
Thanks,You seem to have access to information,not easily found,any chance your a Kaspersky hater? GlSpecifically the 4 that failed are Avira AV Pro (version 15), Eset (ver 10), Kaspersky Total Security 2017, and Comodo Client security (ver 8).
It is also important to note that they did NOT test if any OutBound Containment technology was already present on the machine (this was a specific point made in the presentation)- In other words at the point of infection the "rocket" must have the ability to scan for and acquire data that would be then passed on to the "Satellite". So those using Cruel Comodo wouldn't be prone to the issue as the rocket can't find the data to collect.
However, all of the above products HAVE FIXED THERE PRODUCTS and are not vulnerable currently, EXCEPT for Kaspersky who obviously does not care.
Fun Facts:
1). Avast, AVG, Windows Defender, Norton, Mcafee, and Bitdefender clouds were tested and passed.
2). The sandboxes used by both VirusTotal and Payload Security's Hybrid Analysis were prone to the issue.
However, all of the above products HAVE FIXED THERE PRODUCTS and are not vulnerable currently, EXCEPT for Kaspersky who obviously does not care.
Virustotal also does not want to restrict the Internet access of the sandbox, which is allowed on different ports.Fun Facts:
1). Avast, AVG, Windows Defender, Norton, Mcafee, and Bitdefender clouds were tested and passed.
2). The sandboxes used by both VirusTotal and Payload Security's Hybrid Analysis were prone to the issue
The info is all in the report
The info is all in the reportThanks,You seem to have access to information,not easily found,any chance your a Kaspersky hater? Gl