- May 26, 2014
- 1,339
I believe in such cases it's already "game over", just said in general, user downloading any malicious installer from homepage XY, then installing this abused "software" with admin-rights... of course, AVs may be monitoring suspicious file behavior but it's probably too late to intercept all malicious activities...
Exactly! If a malicious code executes with admin-rights it is already "game over"; self-defense, tamper protection are borderline useless and I really cant understand why people care too much AFTER the system was already breached.
The best way to protect against those kind of threats (and the rest too) is to use the "Rule of 3", just wait 3 days to execute new code in your system after its download, you can apply that to avoid buggy updates in Windows, faulty graphic drivers and so on, you can apply that to almost everything.
3 days is usually more than enough to security vendors, AI algorithms, machine learning, independent security researchers to notice the threat and "solve" it.
Ps: Avoiding snake oil software like IOBIT products are a good start to protect your system.
Ps2: Limiting the number of third party software in your machine is a nice way to limit the attack surface.