cruelsister
Level 43
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Forum Veteran
Ransom Buster allows by default the access to protected folders for some popular applications. So, it can be defeated by exploiting one of those applications (Explorer, CMD, MS Office, etc.) . I managed to delete the file from the protected folder using:Interesting test.
...
Maybe they only block/enforce a notification for processes they deem "suspicious", and default-allow for processes they don't believe are up to mischief. Hmm.
Thanks for testing it out, nice review. @cruelsister![]()
Easy File Locker can be also defeated by any malware that can install a driver to get the low-level disk access.Using Easy File Locker. Anyone ever tested it against ransomware? I don't allow Explorer to write to the drives, but it would be helpful to know if applications are generally exploitable this way. I have a few I allow which I could just elminate and unprotect when necessary...
There is no good solution for protecting your folders except making backups on the external drive or applying default-deny security. I think that protecting the data disk with Shadow Defender could be also a strong protection. When the malware is already running in the system, there are so many ways to destroy/compromise your data in folders, that it is very hard to protect them.Easy File Locker can be also defeated by any malware that can install a driver to get the low-level disk access.
What you say is 100% factualThere is no good solution for protecting your folders except making backups on the external drive or applying default-deny security. I think that protecting the data disk with Shadow Defender could be also a strong protection. When the malware is already running in the system, there are so many ways to destroy/compromise your data in folders, that it is very hard to protect them.
Any process trusted by Pumpernickel, as long as you can inject code into that trusted process, then you can evade the whole file-system operations restrictions. Pumpernickel driver uses FltRegisterFilter kernel-mode callback but it will allow programs granted access on the list, so target one of those and you're in.Interesting comments. Has anyone verified that they are true for Excubits Pumpernickel. I've subjected my VM which has two drives against a lot of malware, and nothing has been able to touch the drive protected by pumpernickel.
However a lot of malware in the wild targeting home users is simply crap and not very sophisticated. You have exceptions every now and then (usually with a break-out which has good spreading capabilities) but the chances of malware adapting to bypass Pumpernickel any-time soon is small.I've subjected my VM which has two drives against a lot of malware, and nothing has been able to touch the drive protected by pumpernickel.
Yea!...
Shadow Defender is great but if you get infected then it's game over. Even if your data isn't changed after a reboot, data could still be ex-filtrated too! People forget this all the time...
...
Well then, that is a lot more secure alreadyExplorer.exe is indeed blocked from the appropriate drives.
From some posts (2016 year) it follows, that Pumpernickel (Fides) could not protect folders against the malware which has got low-level disk access. You can ask @WildByDesign if this changed with the newer versions of Pumpernickel (Fides).Interesting comments. Has anyone verified that they are true for Excubits Pumpernickel. I've subjected my VM which has two drives against a lot of malware, and nothing has been able to touch the drive protected by pumpernickel.
Easy File Locker can be also defeated by any malware that can install a driver to get the low-level disk access.
Normally, applications running with Administrative rights cannot access folders protected by EFL. They have to exploit something in the kernel or install a custom kernel driver allowing low-level disk access. So, the common malware running in the user-mode (elevated or not) will not defeat EFL protection.@Andy Ful...any idea how running for all users as Admin might affect the depth of folder protection with this application? I understand that if malware gets privileged access to the disk it can make changes. Just would like to know if anyone knows how far EFL can be configured to go with protection...
SUA is pretty good on Windows 7, too. In theory, it can be bypassed when someone elevates an application and the malware is already lurking in the background. There was @cruelsister's video on NotPetya that bypassed SUA on Windows 7, but the mechanism is unclear. But generally, the real danger is when using an Admin account.Seems like EFL in SUA is pretty decent protection as long as the user is careful and as long as initiated malware cannot bypass UAC...the apparent weak link in Windows 7 at least...