Even if the beta version is...very stableAny plans when the stable version of SWH is coming?
Even if the beta version is...very stableAny plans when the stable version of SWH is coming?
Yea, just feeling better when I know that it's called "stable"Even if the beta version is...very stable
Yea, just feeling better when I know that it's called "stable"
The emails can be jarring, but the technique used by Qakbot (aka Qbot) seems to be especially convincing: The email-borne malware has a tendency to spread itself around by inserting malicious replies into the middle of existing email conversations, using the compromised accounts of other infection victims. These interjections in the form of a reply-all message include a short sentence, and a link to download a zip file containing a malicious office document, one that brings down the malware when someone opens it.
Which bug?when are you going to have some time to fix the appinstaller bug? Thank you very much for your immense work.
The malicious .xlsb file triggers regsvr32 to load DLL payloads it drops in a five-character folder name on the root of the C: drive
...but of course I realize with H_C on Default or Max settings, OSA is not needed
Regsvr32 is used to register and unregister OLE controls. It is too often used for benign processes (also for DLLs in UserSpace). That is why it is in the experimental section.
Your post gave me reason to check OSA's Exclusions for anything Regsvr32 related and there is nothing so far, so I guess my simple home usage hasn't done anything yet to require the need for Regsvr32 to load DLL's.
Otherwise you keep providing more compelling evidence that I don't really need OSA
You probably do not need OSA and SWH.
Yes. Sometimes it is used after Windows Updates for something. I block it via H_C (and over 170 LOLBins including Windows Script Host, PowerShell, and CMD) for a few years on my wife's computer without any issue. But my wife uses only applications from Microsoft Store and two desktop applications.under typical operating & application usage, regsvr is very rarely needed, almost exclusively when installing programs, it can be blocked without any breakages
@Andy Ful I have two questions about the DocumentsAntiExploit tool:
1) Does the Adobe Reader setting work with Adobe Reader DC 64bit?
I got no yellow message bar and had to configure it in Adobe Reader myself.
2) What is the best setting for the latest MS office 365 64-bit ON1 or ON2?
The real difference between those two settings is not clear to me.
That is OK.I'm currently using Windows 11 with Ziggo Safe Online by F-Secure 18.2 (Default Settings), Simple Windows Hardening 1.0.1.1 beta 3 (Basic Recommended Settings) and DocumentsAntiExploit 2.0.0.0 (Adobe Reader ON, MS Office ON2).
... Adobe Reader thing could also be something just on my system.
What does that mean for Simple Windows Hardening and DocumentsAntiExploit?For casual users, the best Adobe Acrobat Reader settings are probably the default ones (Protected View = OFF) and additionally:
Even if the user will enable JavaScript for the document, it will run in AppContainer. Acrobat Reader cannot use opening non-PDF attachments in external applications or URLs embedded in the documents, and cannot run other applications/LOLBins.
- Disable JavaScript.
- Disable opening of non-PDF file attachments with external applications.
- Block PDF files to all web sites.
- Enable Defender's ASR rule for Adobe.
All of these restrictions (except JavaScript running in AppContainer) are bypassed when one uses Protected View and pressed "Allow All Features". The Defender's ASR rule prevents opening non-PDF attachments and running external processes.