- May 4, 2019
- 825
I don't know how you arrived at that conclusion, and especially the bit about no security software at all. What I got out of it was don't rely on NVT OSA to be your complete security apparatus.Conclusion: Don't use security software at all, because it will fail anyway
Conclusion: Don't use security software at all, because it will fail anyway
@ebocious,I don't know how you arrived at that conclusion, and especially the bit about no security software at all. What I got out of it was don't rely on NVT OSA to be your complete security apparatus.
Your conclusion is stupid. If you use OSArmor with AV you'll get over 90% protection.Conclusion: Don't use security software at all, because it will fail anyway
Your conclusion is stupid. If you use OSArmor with AV you'll get over 90% protection.
I have already commented Juan Diaz video's:
https://malwaretips.com/threads/wisevector-stopx-vs-ransomware.95058/#post-835181
But, this one requires some additional notes because OSArmor is not an AV. It is not designed to detect the PE malware (like EXE, DLL etc.), but can harden the system in many ways to avoid suspicious files/actions.
For example, the delivery method of Ordinypt Wiper malware from the post:
- It is easy to compile the signed malware which could bypass OSArmor if one knows how the system is hardened. Similarly, it is easy to go out of the labyrinth if one knows the right way. But, most widespread malware in the wild will be blocked, anyway.
- Most EXE malware in the wild is not delivered as a direct download. Usually, they are delivered by using scripts (directly or embedded in spam, documents, etc.), ZIP archives, or LOLBins. This delivery method is blocked well by OSArmor, which can be seen on the video.
Security Alert - Fake résumé emails attempt to spread Ordinypt Wiper to German recipients,
uses ZIP archive (spam attachment) with the malicious EXE file (Lebenslauf.pdf.exe) that pretends to be a PDF document. This also will be blocked by OSArmor.
If the author wanted to show that OSArmor can be bypassed, then this is nothing new.
If the author wanted to show how effective is OSArmor, then he failed as I commented in the post about his test on WiseVector.
If the author wanted to show how OSArmor works by using some malware examples, then the video is probably OK.
That person uses malware grabbed off of Hybrid-Analysis and other online malware repos. They aren't making custom, targeting malware.
Wow, impressive results. Certainly something worth considering as an addition if I move away from Comodo at any point. I'll have look into it.
The samples in the test are not random samples, but specially selected samples. The last sample had to be digitally signed to bypass OSArmor. The guy knows how OSArmor works and selected the last sample to bypass OSArmor.
Yes, I know. I also did not say that the author uses custom made malware. Anyway, selecting samples to bypass something has the same effect as preparing the custom malware to bypass something.I did not say they are using random samples. They are getting the samples from the usual online sources. They aren't making their own malware.
That is also my opinion. The video uses selected samples to show how OSArmor can block malware, and that it is not 100% efficient. It cannot show anything interesting about the effectiveness of tested software. I do not think that the author's intention was showing this.Of course one would make a video of a sample that knowingly bypasses the protections. The whole point of the video is to show what can happen. Otherwise, there is no point in making the bypass video.
Yes, I know. I also did not say that the author uses custom made malware. Anyway, selecting samples to bypass something has the same effect as preparing the custom malware to bypass something.
That is also my opinion. The video uses selected samples to show how OSArmor can block malware, and that it is not 100% efficient. It cannot show anything interesting about the effectiveness of tested software. I do not think that the author's intention was showing this.
Agreed. I'm kind of interested in giving @Andy Ful's H_C a try. Has this test been performed against it?Toss OSArmor on with almost any AV suite and you aren't getting infected, by anything. OSArmor makes even a mediocre or substandard AV suite into a rockstar. I think that is ultimately the purpose of it.
It was tested on Malware Hub (Windows Defender disabled):Agreed. I'm kind of interested in giving @Andy Ful's H_C a try. Has this test been performed against it?
I'm going down the list, and I see 100%, 100%, 100%...