W
Wave
Thanks for sharing!
In fact, Petya itself contains no functionality to bypass sandbox mechanisms/virtual environments to attack the host system - it targets the Master Boot Record and overwrites it, therefore if the security product does not isolate the sample so it cannot access the boot sector (or monitors attempts for write requests to it and blocks them for the sample as it's running dynamically) then the system will become compromised.
Therefore, even though Petya was not blocked in the first video, the Petya sample itself did not "bypass" Comodo Sandbox - nothing like this occurred. It was the fault of Comodo.
No, it can't.you think Petya is able to bypass SD and encrypt host machine?
In fact, Petya itself contains no functionality to bypass sandbox mechanisms/virtual environments to attack the host system - it targets the Master Boot Record and overwrites it, therefore if the security product does not isolate the sample so it cannot access the boot sector (or monitors attempts for write requests to it and blocks them for the sample as it's running dynamically) then the system will become compromised.
Therefore, even though Petya was not blocked in the first video, the Petya sample itself did not "bypass" Comodo Sandbox - nothing like this occurred. It was the fault of Comodo.