Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Malware Analysis
Sality virus question
Message
<blockquote data-quote="Parsh" data-source="post: 864345" data-attributes="member: 58090"><p>I've not used SpyShelter.</p><p>VDS should block the .exes or the .scr files through which Sality viruses often target systems. VDS does not block exploits, but the payloads delivered.</p><p>Sality viruses have many mechanisms like loading a malicious DLL through SYSTEM folder / load their code in-memory without touching the disk / loading a device driver etc and then infecting autoruns and creating backdoors.</p><p>VDS does not protect against <em>in-memory exploits</em>, though <em>if</em> a new process (not whitelisted) is spawned in the sequence, VDS will alert. Then again, it's upon the user's conscience and choice of action on the alert. VDS was earlier not able to directly or indirectly protect against device drivers, though I had read only 1 such case on WS forum. Not sure about its current capability.</p><p></p><p>Still, for a home user, in most cases, VDS accompanied with a good AV with memory scanning should be enough.</p><p>You should <em>not</em> be more worried about this specific virus than other malware infections. Securing different attack vectors is the baseline. You could sandbox your browser to fortify.</p><p></p><p>Regarding the possibly infected program files, a real-time AV that scanned those setup files when they were created/downloaded will most likely be detecting (tempering) changes to the files. Malware authors had found workarounds for this, but it's a cat-and-mouse game. A VT scan can also help with 2nd opinion.</p><p>You should verify the setup.exe <a href="https://www.novirusthanks.org/products/md5-checksum-tool/" target="_blank">checksum</a> with the checksum listed on the official site of the downloaded program. Other than that, getting a fresh/updated copy of the program setup file every time you need to install a program, and running a checksum verification before installing is a good idea.</p></blockquote><p></p>
[QUOTE="Parsh, post: 864345, member: 58090"] I've not used SpyShelter. VDS should block the .exes or the .scr files through which Sality viruses often target systems. VDS does not block exploits, but the payloads delivered. Sality viruses have many mechanisms like loading a malicious DLL through SYSTEM folder / load their code in-memory without touching the disk / loading a device driver etc and then infecting autoruns and creating backdoors. VDS does not protect against [I]in-memory exploits[/I], though [I]if[/I] a new process (not whitelisted) is spawned in the sequence, VDS will alert. Then again, it's upon the user's conscience and choice of action on the alert. VDS was earlier not able to directly or indirectly protect against device drivers, though I had read only 1 such case on WS forum. Not sure about its current capability. Still, for a home user, in most cases, VDS accompanied with a good AV with memory scanning should be enough. You should [I]not[/I] be more worried about this specific virus than other malware infections. Securing different attack vectors is the baseline. You could sandbox your browser to fortify. Regarding the possibly infected program files, a real-time AV that scanned those setup files when they were created/downloaded will most likely be detecting (tempering) changes to the files. Malware authors had found workarounds for this, but it's a cat-and-mouse game. A VT scan can also help with 2nd opinion. You should verify the setup.exe [URL='https://www.novirusthanks.org/products/md5-checksum-tool/']checksum[/URL] with the checksum listed on the official site of the downloaded program. Other than that, getting a fresh/updated copy of the program setup file every time you need to install a program, and running a checksum verification before installing is a good idea. [/QUOTE]
Insert quotes…
Verification
Post reply
Top