We are not talking about doors or windows or about any planes or pingouins.
Trojans have for ability to be hidden and spy.
The trojan:
- Add himself to the startup.
- Copy himself. (not all times)
- Run himself.
And as we know, the keys names can be everything or randomed.
A trojan can install himself first time as Skype, the other time as SuperProgram.
So,
- Add himself to the startup.
- Copy himself. (not all times)
- Run himself.
All programs can copy themself. Like torrents, installations (setup), firefox updating himself etc.
So, we can't monitor that.
- Add himself to the startup.
- Copy himself. (not all times)
- Run himself.
We can't block the run because all programs can run-themself for updating or for running some line-commands.
So, we can't too.
- Add himself to the startup.
- Copy himself. (not all times)
- Run himself.
Let's say that the security software, detect the outgoing port.
The crypter can change that with a legal outgoing http.
Let's say that antivirus block the little files, as we know much of malwares are little size files.
The crypters can pump them easly.. so, bypassed too.
Believe me, all security solutions that you can see on VirusTotal lists (60 AV) can be bypassed FULLY at 100%.
The thing harder is not to block anything. The harder is to differentiate the good and the bad.
But in our case, Skype can do things that a trojan do
So, it's very hard to differentiate.
Much of malware has them behavior yes, but lot of them had behaviors that any software can't differentiate.