Firstly, it may cause automatic malware analysis systems to function incorrectly: the file would be downloaded and analyzed by the antivirus program, and given the all-clear; with time the link will be exempted from checks altogether.
bogdan said:The part that is unclear to me: the article states that KasperskyLab "discovered a new type of malware infection method". If they are referring to the fact that an executable is hidden inside an image... this is not something new, it's called steganography. As far as I can tell this enables malware authors to transmit and spread files without triggering a detection, however to execute the malicious executable inside the image, another executable is needed to decrypt it. So on its own, the image file does nothing.
McLovin said:Wow, people that make viruses are getting better at making and hiding them.
HIPS is chatty, Sandboxie speaks softly and carries a big stick. I prefer the quietness and effectiveness of Sandboxie. Depending on HIPS, errors can happen. Errors don't happen if you run the file sandboxed.win7holic said:Yes. but what we "should" do it?
I think, may use the HIPS on the machine would be better?
as said by Umbra above.
or, scan it with AV or, another scanner tool?
bogdan said:The part that is unclear to me: the article states that KasperskyLab "discovered a new type of malware infection method". If they are referring to the fact that an executable is hidden inside an image... this is not something new, it's called steganography. As far as I can tell this enables malware authors to transmit and spread files without triggering a detection, however to execute the malicious executable inside the image, another executable is needed to decrypt it. So on its own, the image file does nothing.