- Mar 1, 2014
- 1,708
Hehehe... I was just looking for this because I had no chance to watch yesterday. Did you delete the video? I couldn't find the one you posted yesterday.
But then boom you just posted the video. So thanks!
Hehehe... I was just looking for this because I had no chance to watch yesterday. Did you delete the video? I couldn't find the one you posted yesterday.
But then boom you just posted the video. So thanks!
Hmm, Is your AppGuard is a one more HIPS system?You already knew the end result... you just wanna watch a video for its "entertainment value."
Hmm, Is your AppGuard is a one more HIPS system?
Will check it out. Thanks.AppGuard is in a security software category known as "software restriction policy"; it is not HIPS.
Yeah, I already expected the result. I just wanted to know how AppGuard handles this ransomware. I expected the User Space block, which is a bit boring because it's just a block, no-frills, no thrills (/s) .You already knew the end result... you just wanna watch a video for its "entertainment value."
What I want to see now is how AppGuard operates if WannaCry is digitally signed.
Yes, I know. But I just want to know how exactly AppGuard operates with WannaCry running. I just want to know with my own eyes.If it executes, then it will encrypt files in User Space except those in Private Folders.
Guarded protections do not prevent file encryption.
You already know this...
Yes, I know. But I just want to know how exactly AppGuard operates with WannaCry running. I just want to know with my own eyes.
hehehe.. I won't.Grab a WannaCry sample from Hybrid-Analysis.com and run it Guarded from the desktop...
hehehe.. I won't.
I'll just wait. Maybe someone will test when a WannaCry sample acquires a digital signature.
But if WannaCry never acquires a digital sig, then the better for all because it would be easier to detect and block.
It checks if the domain responds to the request."If the domain was not registered, the ransomware would start its encryption process, if it was registered, it would not encrypt any files. To protect victims, the researcher registered the domain, effectively preventing WannaCry from making new victims."
I don't understand how domain affects the working of Ransomware. Can anyone explain this in layman's terms?
Thanks for the reply.It checks if the domain responds to the request.
If not - encrypts files.
If yes - doesn't start at all
As far as anyone can tell the domain was designed to be a killswitch. It would have afforded the author the ability to register the domain and stop the ransomware from continuing to encrypt files on systems that it spread to.Thanks for the reply.
Sorry, I am a noob but why it checks with the domain and why not just start encrypting the files on the PCs it gets activated?
Does it have to do with the decryption keys?
Thanks for explaining that. I think I got it.As far as anyone can tell the domain was designed to be a killswitch. It allowed the author the ability to stop the ransomware from continuing to encrypt files on systems that it spread to.
Since then another variant has been released with the domain killswitch removed.