A lot of ransomware uses hollow process - but Webroot seems to be able to rollback most. So not sure about hollow process negating journaling & rollback.
The only time I've seen Webroot rollback a ransomware is when it didn't use hollowing.
Of course I don't claim to know all situations. I speak of only my personal experience. In my personal experience I've never seen Webroot able to rollback something that used hollow process. It couldn't even detect that the process had been tampered with. I've left malwares to run on a Webroot protected machine for days; the original file ends up being blacklisted, but the rollback never occurs because everything happened under explorer.exe or svchost.exe.
I'm not going to say that they lied or do lie about their firewall...In my testing, Webroot firewall has NEVER blocked a single malware from connecting out
Well I won't accuse a company of lying either, lest they take legal action, plus as I said earlier I don't claim to know all circumstances. There could be situations where it does block it automatically, like, maybe when it's an already blacklisted file. But if it was an already blacklisted file it wouldn't be running in the first place?
I've also never seen Webroot automatically block outbound access for anything, or even throw up a prompt on Win8+. Sidenote: I've never heard from an official Webroot employee that Webroot will auto block internet access for malware. I've only heard this from non staff members.
I've heard statements from Webroot forum members (I won't use names but you probably know them if you've visited the Webroot forums) "Webroot's firewall is intelligent and
will block malware from communicating to its host automatically" like I mentioned earlier. Again, this kind of begs the question though, if Webroot is intelligent enough to know it's attempting malware communication, then why is it letting it run at all...?
I like Webroot - the product, but at the same time I bash the company for their lack of fixes and transparency - and the fanboys for their denial and defense of Webroot the company.
+1 Upvote.
I have seen malware cases that once run on a Webroot protected system cause WSA multiple GUI failures, no rollback and bad persistent infection with difficult clean-up.
I also remember that malware was able to cause a blue screen during Webroot's rollback and stop the rollback function there. Not sure if this has been fixed or not yet.
@FleischmannTV - an outbound firewall is of only limited value - as you point out - because malware can easily "mis-lead" a firewall or just plain bypass it completely through various means.
Very, very true.
Even the company themselves stopped officially saying that Webroot could rollback all malwares (they used to say this, but have quietly ceased saying this). It's only members that don't know about the ways around rollback that continue to tout this. One of their favorite responses is providing a couple videos and info-graphics about the Webroot cloud and why Webroot is all you need, why the cloud and rollback is so good, etc.
They don't want anyone to openly report any kind of issues on the Webroot community - and if you do give intricate details - they will descend upon that person and bash what has been posted
I also really don't like the way the expect you to just take the info you are given and be happy with it; it's almost like they want you to just blindly believe the above mentioned infographics and videos about how Webroot is the greatest and will protect you all the time, or how they try to just shut you down when you mention a flaw, as you stated above.
but at the same time I bash the company for their lack of fixes and transparency
Regarding the lack of fix info, this is something that really irks me. "Improvements to scan engine. Bug fixes. Improvements to engine. Enhanced this, enhanced that." What kind of changelog/release notes are that? Look at the latest Norton updates. They made an entire, detailed page on the vulnerabilities and the patches that were released to fix them. I feel like Webroot's version of this would have been "Fixed a bug in scan engine" if they had to fix a vulnerability.