F
ForgottenSeer 85179
This is the version, not build.Thanks for reminding me. I'm using Win 10 Home
Call "winver" from start menu.
This test shows how an antivirus behaves with certain threats, in a specific environment and under certain conditions.
We encourage you to compare these results with others and take informed decisions on what security products to use.
Before buying an antivirus you should consider factors such as price, ease of use, compatibility, and support. Installing a free trial version allows an antivirus to be tested in everyday use before purchase.
This is the version, not build.Thanks for reminding me. I'm using Win 10 Home
This is the version, not build.
Call "winver" from start menu.
If you update to one the last two builds (2004 or 20H2, I prefer 20H2) you get a report of what driver is blocking core isolation.Ver 1919 build 18363.1198, and Hyper-V's running. Tried core isolation and got an "incompatibility with your device" problem. It's probably because of Avast, so I might try when when I uninstall the AV.
The information provided about Norton here is wrong. Once upon a time, Norton really had effective marketing, was backed up the strongest company in the industry, had great protection and large market share. This is no longer the case. Even before the Broadcom disaster, Norton technologies didn't evolve one bit in the last few years. Product is doing well against executables, where it can apply reputation analyses, but protection against anything else is almost non-existent. The biggest market share now, in both corporate and consumer field is held by McAfeeI suspect that there can be no measurable difference between most of the popular AVs, except for targetted attacks. If one takes a look at AVLab reports, all AVs have the same protection (differences are less than measurement errors). This can follow from the fact that AVLab honeypots catch mostly the large scale attacks (with a little delay). The biggest AV testing labs have a much larger infrastructure and can catch more 0-day malware used in targetted attacks - so we can see more missed samples in the reports.
If so, then the results of most AV tests are not relevant for home users.
I also suspect that the stellar results of Norton can come from corporate honeypots. Simply, Norton catches the malware used in targetted attacks on the Norton protected enterprises before AV testing labs do. So, Norton has an advantage because it has the biggest market share. This is an advantage for the test results, independently of the number of endpoints that were infected in the targetted attacks. Of course, the Norton protection is probably one of the best, even if the test results are slightly distorted.
One can say that WD/MSD has a bigger advantage, but it is not true because the popularity of WD/MSD is not the same as MSD ATP (paid).
Anyway, the above thoughts & speculations are far from something that could be proved.
The information provided about Norton here is wrong. (...) The biggest market share now, in both corporate and consumer field is held by McAfee
I don't trust Statista and Opswat to deliver accurate information about security software market share. I trust information declared by vendors themselves, according to which, Norton and Panda actually have the smallest slice of the pie at the moment. My observations are also based on news that I constantly read, as well as analysis of market share, revenue and other factors. If you do a search on Google, you'll realise both Broadcom Symantec and NortonLifeLock sales are declining continuously. Both companies consistently lay off staff and lose market share. This can be confirmed by looking at the price point of their products - it's obvious that the company is desperate for sales.View attachment 248988
What is your source about AV market share?
Symantec was the top vendor from October 2019 according to OPSWAT data but not before. For example in January 2019. Symantec was far away from the top vendors (3.75%), but it still had stellar results in AV-Test reports. So, my speculations are not supported by the market share data....
I also suspect that the stellar results of Norton can come from corporate honeypots. Simply, Norton catches the malware used in targetted attacks on the Norton protected enterprises before AV testing labs do. So, Norton has an advantage because it has the biggest market share.
...
Anyway, the above thoughts & speculations are far from something that could be proved.
Let's put it simply, companies normally reinvest certain percentage of annual profit in R&D. Broadcom sees Symantec as nothing more than a cash generator, so the resources they reinvest are kept to the absolute minimum. Even if they did have the biggest market share, this still wouldn't make any difference, as the money is just spread across various banks and not utilised for an effective core operation. Broadcom and NortonLifeLock have gone so low now, they don't even publish threat writeups and security reports. All security intelligence that Symantec once used to publish is now wiped away.Symantec was the top vendor from October 2019 according to OPSWAT data but not before. For example in January 2019. Symantec was far away from the top vendors (3.75%), but it still had stellar results in AV-Test reports. So, my speculations are not supported by the market share data.
Reports - OPSWAT Resources for Cyber Security
Learn about OPSWAT's products and solutions for secure file transfers solutions for high-security networks.www.opswat.com
Understand. Anyway, by looking at the OPSWAT statistics from several months in the years 2018-2019, I found out that the stellar results of Norton in AV-Test reports, cannot be supported by the market share argument.I don't trust Statista and Opswat to deliver accurate information about security software market share.
...
I'm having hard time trusting this 1 missed 0-day sample thing. If I install Norton now, In 30 minutes I will discover at least 5, not detected by any layer of Norton's protection. I don't know what exactly is going on there, but the results are misleading and inaccurate.Understand. Anyway, by looking at the OPSWAT statistics from several months in the years 2018-2019, I found out that the stellar results of Norton in AV-Test reports, cannot be supported by the market share argument.
Norton missed only one 0-day sample according to AV-Test reports in the years 2016-2020.
So do I (as you already know).I'm having hard time trusting this 1 missed 0-day sample thing. If I install Norton now, In 30 minutes I will discover at least 5, not detected by any layer of Norton's protection. I don't know what exactly is going on there, but the results are misleading and inaccurate.
I created a piece of malware myself tonight to check this amazing 0-day performance many of them have, only Kaspersky is good enough to block it. They should approve the thread tomorrow.SE Labs tests April 2018 - Jun 2020, overall level of protection, making no distinction between neutralised and blocked incidents.
Antivirus Test Results - SE Labs Consumer Security Reports
Antivirus test results for home users. You deserve the same levels of protection as big businesses. Our antivirus tests help you find the bestselabs.uk
Norton Security ..........................100 + 100 + 100 + 100 + 100 + 100 + 100 + 99 + 100 = 899
Kaspersky Internet Security ........99 + 100 + 100 + 97 + 100 + 100 + 100 + 100 + 100 = 896
Trend Micro Internet Security .....99 + 98 + 100 + 99 + 100 + 100 + 100 + 100 + 100 = 896
F-Secure Safe .............................100 + 99 + 100 + 100 + 100 + 100 + 98 + 100 + 98 = 895
Microsoft Windows Defender ....97 + 100 + 100 + 99 + 100 + 99 + 98 + 99 + 100 = 892
ESET Internet Security................ 99 + 99 + 99 + 100 + 99 + 98 + 100 ? < 894
Avira Free Security Suite ............94 + 97 + 97 + 97 + 99 + 98 + 97 + 99 + 96 = 874
McAfee Internet Security........... 99 + 86 + 95 + 100 + 99 + 99 + 96 + 97 + 100 = 871
AVG Antivirus Free Edition........ 94 + 93 + 92 + 97 + 97 + 98 + 98 + 100 + 99 = 868
Avast Free Antivirus................... 91 + 91 + 93 + 99 + 98 + 98 + 98 + 99 + 99 = 866
Other AVs did not participated in all tests but their scorings could be close to WD or worse.
Comodo Internet Security ? ? ? ? ? 100 + 100 + 99 + 97 <= 896
Sophos Home Premium ? ? ? ? 98 + 100 + 98 + 100 + 100 <= 896
Bitdefender Internet Security 95 ? ? ? ? ? ? ? ? <= 895
Check Point ZoneAlarm 91 + ? ? ? + 94 + 99 + 97 + 97 + 95
eScan Internet Security Suite ? ? ? 92 + 96 ? ? ? ? <= 888
G-Data Internet Security ? 89 + 92 + 85 + 92 + 95 ? 95 + 97
Bullguard Internet Security ? ? ? 94 + 87 ? ? ? ?
Webroot Antivirus 67 + 88 + 84 + ? ? + 81 + 96 + 81 + 95
So, it is clear that WD/MSD results (default settings) are better than any free AV (except maybe CIS) and better than 60% of popular commercial AVs tested by SE Labs.
When we take the cumulative results of AV-Test, AV-Comparatives, and SE Labs then only Norton has consistently better results in all these tests. This is another argument for very similar detection of most AVs in the home environment. The Norton case is exceptional.
You cannot count on VT detection. In many cases the samples were blocked by AVs after execution even when they were not detected on VT.I created a piece of malware myself tonight to check this amazing 0-day performance many of them have, only Kaspersky is good enough to block it. They should approve the thread tomorrow.
Malware piece 1:
View attachment 249043
Malware piece 2:
View attachment 249045
My test proves few points:
Nobody can score 100% on 0-days
Machine Learning, as much as it’s smart is also stupid. Human-writen generic detections based on math-models are far more potent than automated algorithms
And last, but not least, Kaspersky has the best engine around.
It wasn’t blocked by MD, Avast and Malwarebytes after execution. I haven’t had time to test others. Testing Norton will be the first thing I’ll do tomorrow.You cannot count on VT detection. In many cases the samples were blocked by AVs after execution even when they were not detected on VT.
What your samples do in the system?It wasn’t blocked by MD, Avast and Malwarebytes after execution. I haven’t had time to test others. Testing Norton will be the first thing I’ll do tomorrow.
The sample imitates an Emotet loader, in fact I got inspired by Emotet, which Microsoft claims to have blocked with machine learning model in seconds... there was this sort of post on their blog, if I am not mistaken. Hope the Emotet team doesn’t come after me with copyright claimsWhat your samples do in the system?
This. Amazing AV with a horrible UI.Why Microsoft hide advanced settings? Is it still 'beta'? I don't see a point
Such an attack will bypass many security solutions. The modified 0-day loader does not do anything malicious so it can be stopped by WD with some ASR rules, but not by default settings. Generally, AV home versions are not good to fight such attacks. Although KIS (default settings) has probably better protection than most Home AVs, it can fail in many cases too. There are so many possibilities that any generic algorithm cannot be sufficiently good.The sample imitates an Emotet loader, in fact I got inspired by Emotet, which Microsoft claims to have blocked with machine learning model in seconds... there was this sort of post on their blog, if I am not mistaken. Hope the Emotet team doesn’t come after me with copyright claims
So I downloaded a malicious sample and uploaded it on a benign website (won’t disclose all details for security reasons). This way I bypassed web filter blacklists
The Emotet loader simulator uses BitsTransfer (Emotet uses System.Net.WebClient) to download the malicious file and write it on the Desktop. Writing to the desktop decreases machine learning sensitivity as opposed to writing in temp folder or somewhere else.
To make things a bit more interesting, I used a hex editor to modify slightly the malicious file downloaded, which bypassed any reputation technologies. Finally, PowerShell executes the sample. To decrease machine learning sensitivity throughout the whole process, on the second sample, I’ve removed attributes such as hidden window, no exit and others.
I used a tool widely available on the web to obfuscate the code, just like Emotet creators do. It hasn’t been encoded with base64 (unlike Emotet) but has been concatenated, which makes it human unreadable and also, bypasses signatures and heuristics. To bypass the execution policy, I ran the code as an argument, not as a script.
It took me less than 20 minutes to do all that and the result - few of them failed already. The malicious sample was a variant of nanocore rat (known for its privilege escalation) and was successfully executed in all test cases. There was not even a UAC prompt. Avast’s IDP kicked in and removed nanocore, but wasn’t smart enough to correlate it to my loader. Defender and Malwarebytes did nothing. Kaspersky detected everything upfront (on VirusTotal), Eset detected the first one, probably due to attributes, commonly used by malware. That’s on VirusTotal again.