Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
Bitdefender IS 2017 vs. NonPetya - quickie
Message
<blockquote data-quote="Parsh" data-source="post: 648323" data-attributes="member: 58090"><p>I agree that cloud (among the different modules) <em>could have protected</em> from<em> this kind of attack</em>, like in many cases of Kaspersky ART. Thanks for another superb vid [USER=51905]@Evjl's Rain[/USER] <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite110" alt=";)" title="Wink ;)" loading="lazy" data-shortname=";)" /></p><p>What I've seen frequently with different RW samples (normal mode of execution, either downloaders or direct payload), BIS'17 & BTS'18 Beta often find <u>new variants as infected via cloud analysis / <u>definitions</u></u> OR the <u>ATC kicks in</u> intercepting suspicious modes of initiation of malicious activity OR the <u>RW protection blocks the process for modifying the protected folders</u> in uncalled-for ways.</p><p>In some cases, there is a mix of alerts at close stages, example in case of HP Cerber as I can remember.</p><p></p><p>RW protection and ATC (or Threat Defense in 2018B) are quite aggressive, often flagging the wrong things. Unfortunately BD doesn't stand well against vectors like in this video. No doubt Boot Protection had nothing to do here.</p><p>As rightly said:</p></blockquote><p></p>
[QUOTE="Parsh, post: 648323, member: 58090"] I agree that cloud (among the different modules) [I]could have protected[/I] from[I] this kind of attack[/I], like in many cases of Kaspersky ART. Thanks for another superb vid [USER=51905]@Evjl's Rain[/USER] ;) What I've seen frequently with different RW samples (normal mode of execution, either downloaders or direct payload), BIS'17 & BTS'18 Beta often find [U]new variants as infected via cloud analysis / [U]definitions[/U][/U] OR the [U]ATC kicks in[/U] intercepting suspicious modes of initiation of malicious activity OR the [U]RW protection blocks the process for modifying the protected folders[/U] in uncalled-for ways. In some cases, there is a mix of alerts at close stages, example in case of HP Cerber as I can remember. RW protection and ATC (or Threat Defense in 2018B) are quite aggressive, often flagging the wrong things. Unfortunately BD doesn't stand well against vectors like in this video. No doubt Boot Protection had nothing to do here. As rightly said: [/QUOTE]
Insert quotes…
Verification
Post reply
Top