Player replacement: AV (out) - App control (in).HUG COMODO
Player replacement: AV (out) - App control (in).HUG COMODO
My point is not to be argumentative - which I do not think you saw it as such. My intent was only to present one of the multitude of options threat actors have and the most determined and persistent will attempt to accomplish their objectives. For run-of-the-mill threat actors on the dark web that subscribe to services, not so much - they just do the "Spray and Pray" method.That's gonna create a more suspicious file as opposed to firing your Visual Studio or whatever you like using, and statically linking the runtime. The method you are describing is gonna create an executable that looks awfully like a packer + dropper (low trust, very little imports, abnormal .resource section), whilst if you go for the static linking, it is still a low-trust executable, but the script will likely go in the .rdata whilst the interpreter will be precompiled in the .text section.
LUA unlike python seems to allow very easy static linking.
Depending on how the lua environment behaves the way you are describing, if it is dropped in temp or loaded via reflective injection, it will be even more suspicious and unlikely to survive encounter with typical AVs.
The focus is always "How and why the malware bypassed this, that, and the other."I agree, scenarios like these are usually extreme situations, extreme malware, extreme samples, most of us will never run into or experience in our daily lives.
But, it makes for great debate![]()
Thank you for your reply, I appreciate it. Could you also answer this question, please (a bypass question), as I did post it in sincerity. TIAThe focus is always "How and why the malware bypassed this, that, and the other."
Virtually never is there even a glint of discussion about "What can the malware do?"
Well, nowadays there is malware out there that can literally rob you of your entire life.
Jedem Das Seine. To Each Their Own. But relying upon a low probability that it will happen to protect you is something way less than "security by obscurity" and it will not save a person, their family, and many of their assets. After the loss or losses happen, it is almost 100% that the assets (or very valuable data) shall never be recovered. For victims of identity theft, even with insurance coverage, that process takes years, time away from work, working with investigators, appearances in arbitration or court, and so on, and so on.
If it takes a person just a few minutes to erect a powerful chicken fence to keep out 99.999% of foxes and other predators, it makes no sense not to do so.
However, again, Jedem Das Seine.
Can I interpret your above statement to mean Voodooshield and or PCmatic would fix this or be the solution?The antivirus software that detects by reputation is also not affected by obfuscation, in fact, the more frequently you mutate the code, the more likely you are to get a block.
That is exactly what I was asking about; thank you.
I was referring to big names, such as Kaspersky and Bitdefender app control, ESET hips, and MS WDAC.me too. Default deny like voodooshield or PcMatic, seem to shine here
Big Name, Small Name, whatever works.I was referring to big names, such as Kaspersky and Bitdefender app control, ESET hips, and MS WDAC.
God knows which one will work, but at least I seek the one with higher odds to work.Big Name, Small Name, whatever works.
LOl...are we back to the Russian car postsGod knows which one will work, but at least I seek the one with higher odds to work.
Mercedes works, Lada also works, but if I can afford, I will seek Mercedes.
Used to drive Lada for years long time ago; their worst product, while K is their best
Yes of course. Good to have options, choose the best one that is affordable to you. That is common sense I agree with you.God knows which one will work, but at least I seek the one with higher odds to work.
Mercedes works, Lada also works, but if I can afford, I will seek Mercedes.
Just wish I could have my Kaspersky back...I was referring to big names, such as Kaspersky and Bitdefender app control, ESET hips, and MS WDAC.
There is no "indispensable" AV; just select the one best fits your needs among the available.Just wish I could have my Kaspersky back...
If it was dangerous EVERY country would ban it.
Someone in Biden Admin, got butt hurt and threw a sissy, hissy fit.
Panic erupted when @cruelsister's "BEAR" bomb went off... Everyone's frantically searching for the defuse button—PAWS the unBEARable chaos... HUG COMODO!![]()
They should be... Sahara sandstorms and camels can't outrun @cruelsister's viral grizzly bear!It is rather like a video clip about a bear attacking a man in Alaska. People are frightened even on Sahara.
@Shadowra should test the various deny-by-default products head to head, including some of the 139 known malicious file types, along with a false positive / usability test.God knows which one will work, but at least I seek the one with higher odds to work.
Mercedes works, Lada also works, but if I can afford, I will seek Mercedes.
He needs a license for PCMatic@Shadowra should test the various deny-by-default products head to head, including some of the 139 known malicious file types, along with a false positive / usability test.
Then we will all know which ones drive like a Mercedes.
I will buy the license if @Shadowra is interested.He needs a license for PCMatic
They are all reputation-based blocking or detection and filtering. Same goes with DNS, which is filtering and there's a lot of wonkiness to it. It is not anywhere near the simplistic assumptive thinking of the average human - even the "advanced users." In other words, there's nothing that you can really depend upon with a high level of confidence as far as browser extensions.Is there any browser extension, any AV browser extension, NextDNS filter setting (Block NRD's) that would have the potential to stop this type of exploit at the browser level, as this file was already on the desktop?