L
Lucent Warrior
Thread author
I am making a Thread in the now present subforum of Voodooshield to address this once and for all. It has appeared in too many other topics, derailing them, im guilty of climbing aboard that train.
Information i have on this incident..
The video:
This supposed breach was done with version 2.50 of Voodooshield, VoodooAi was not yet incorporated into the product at that time.
The Developer does not believe his product to be completely bullet proof "have to give him credit for facing a reality that many Vendors ignore" and is always willing to listen to someone that may have found a bypass, so that he can correct it.
With this particular case, not enough information is available as the author of the video refused to cooperate, the video is cut short during the test on VS not allowing anyone to see what transpires past that point, and as read above, you would only be in trouble if you were using a Chinese version of windows and Internet Explorer
It is hard to take this seriously when the Author refused to share what he claimed to be a bypass and also did not finish the test in its entirety.
If you have any final words on this, please post them here, as to not derail any more topics. I personally am not putting any stock into it with the given circumstances. Unless the Author is willing to reproduce the test correctly, and or hand me the samples to produce a test with, im going to chalk it up as BS and move on.
Information i have on this incident..
The website was Master-Lee and also Dardivan - or some such Italian website.
User @qftest brought it MT and Wilders. He has multiple threads here, but they got taken down.
This is what remains:
https://malwaretips.com/threads/how...ld-anti-exploit-protection.53428/#post-452982
He submitted all infos with my English help to NVT, VS and Datpol (SpyShelter). From what infos were submitted, Andreas from NVT was able to determine what was up... but he was busy with a private Smart Object Blocker build for a large vendor and at that time said he didn't have time for it.
To get the exploit to work you had to use Chinese Windows with Internet Explorer. They were using Socks proxy. The malware was active around 11 AM and 11 PM. Every few hours a new variant was pushed.
Yes that is the way I understood (I may be wrong, need to find again the post to verity)
Edited:
1x .tmp file : unkown => "blocked" => 2x .tmp : other files => "blocked" => "abnormal" system process started / found in memory
A lot of work have been done since this time by the dev
You have "never got a ransomware attack", you mean "always stopped" by your security tools, or "never" reached you PC ?
(in the second case, I will just hire you to use the PC of one neighbor)
The video:
This supposed breach was done with version 2.50 of Voodooshield, VoodooAi was not yet incorporated into the product at that time.
The Developer does not believe his product to be completely bullet proof "have to give him credit for facing a reality that many Vendors ignore" and is always willing to listen to someone that may have found a bypass, so that he can correct it.
With this particular case, not enough information is available as the author of the video refused to cooperate, the video is cut short during the test on VS not allowing anyone to see what transpires past that point, and as read above, you would only be in trouble if you were using a Chinese version of windows and Internet Explorer
It is hard to take this seriously when the Author refused to share what he claimed to be a bypass and also did not finish the test in its entirety.
If you have any final words on this, please post them here, as to not derail any more topics. I personally am not putting any stock into it with the given circumstances. Unless the Author is willing to reproduce the test correctly, and or hand me the samples to produce a test with, im going to chalk it up as BS and move on.