- Sep 20, 2016
- 116
As we know ransomware (especially Cerber and Locky, the two most common ransomware types currently) are more commonly spread by maladvertising via exploit kits (the most common vectors being Java and Shockwave/Flash) which means that a person does not have to click on anything to get infected by the malware- the script politely will run the malware executable for you (isn't that nice!). Point being that stating not to click an executable and you are safe isn't very true currently.
And, Oh Yeah- it's not user error if an Ad network sells infected advertising to unsuspecting websites; maybe it is time to cast blame in other directions than an innocent user.
Thats it, im going to take my computer into tha backyard right now and fill it with 45 hollow points and be done with it, then no one is going to mess with my stuffI would be remiss if I did not point out that leaving an external drive connected to system and get hit by an external drives encrypting ransomware - you're beat !
Disconnect all external drives while not in active use or use a utility to deny read\write access (have to disconnect\reconnect drive to enforce policy changes - so people won't use it because it is "inconvenient"... LOL I guess you like your valuable data scrambled).
i don't agree what softwares Britec09 recommend. I will recommend : SecureAPlus free,Voodoo Shield free and Comodo firewall free.
Seriously though, you are correct and users should not leave their external drives plugged in all the time, i mean really, who does that
i don't know about that.This is only for Voodoo or for all softwares I recommend?VS won't protect against a browser exploit that abuses whitelisted Windows processes to bypass application whitelisting. A ransomware *.tmp will inherit whitelist status from the trusted Windows process run sequence and run unrestricted...
will NVT ERP protect against it? Let's assume for the sake of argument that you haven't whitelisted any parent processes.VS won't protect against a browser exploit that abuses whitelisted Windows processes to bypass application whitelisting. A ransomware *.tmp will inherit whitelist status from the trusted Windows process run sequence and run unrestricted...
will NVT ERP protect against it? Let's assume for the sake of argument that you haven't whitelisted any parent processes.
in most known browser exploits, the abused process is on the default vulnerable processes list, in which case you should get a prompt from ERP in any case. Is this not true?You have to have processes whitelisted, otherwise every time the process executes you will get an alert. That will amount to hundreds of alerts during a user session.
It was reported to Andreas, but he has been busy with other projects so I don't know what he decided to do.
in most known browser exploits, the abused process is on the default vulnerable processes list, in which case you should get a prompt from ERP in any case. Is this not true?
VS prompts for powershell and cscript and wscript, when browser is active. So VS should protect from the most widespread browser exploits.The default vulnerable process list is kinda small - but you are correct. There are other processes that I would add to that list. There is a Vulnerable Process thread here at MT with a downloadable *.xls.