Which AV Company has best Ransomware protection and why?

Which AV Company has best Ransomware protection and why?


  • Total voters
    65
Y

yigido

COMODO is the only one who can prevent any malware (including Ransomware)
Valid reason = If the file is unknown (all new threats are borning as unknown) then it will goes into sandbox.
I couldn't vote, because Comodo is not in the list :oops:
(anyway, this thread will be another "I'am using X and happy with it" thread) (Good job AV fans)
 

Berny

Level 4
Verified
Well-known
Oct 14, 2016
194
Which AV
I voted Kaspersky.

Why
"The core idea is straightforward: if Kaspersky Internet Security detects some strange modification of your files, it immediately creates fresh copies of these files to prevent them from being ‘stolen’. Then it examines the software that attempted to modify your files. If it is really suspicious, then our product blocks it."

Tip the day
Don't forget about Offline Backups
 

shmu26

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
COMODO is the only one who can prevent any malware (including Ransomware)
Valid reason = If the file is unknown (all new threats are borning as unknown) then it will goes into sandbox.
I couldn't vote, because Comodo is not in the list :oops:
(anyway, this thread will be another "I'am using X and happy with it" thread) (Good job AV fans)
COMODO is utilizing default/deny , and that is beyond the realm of AVs.
 

rosendalek

Level 3
Verified
Aug 16, 2016
126
Trend Micro has a feature that prevents ransomware from encrypting files in selected folders, by default this is my documents, however I have also seen Trends Feature where is detects unusual activity targeting files malware normally targets and backs those targets up, restoring them once the user allows the encryption or allows Trend to remove the threat
 
Y

yigido

Trend Micro has a feature that prevents ransomware from encrypting files in selected folders, by default this is my documents, however I have also seen Trends Feature where is detects unusual activity targeting files malware normally targets and backs those targets up, restoring them once the user allows the encryption or allows Trend to remove the threat
Comodo also has "Protected Data Folders" and "Protected Files" feature, if we count this. No escape from this one
Protected Data Folders, Virus Protection Programs, Comodo Internet Security
&
Protected Files, PC Files, Folders Protection From Malicious Software | COMODO
Files and folders that are added to 'Protected Files' interface are allowed read access by other programs but cannot be modified, whereas the files/folders in 'Protected Data folders' are totally hidden to sandboxed programs. If you want a file to be read by other programs but protected from modifications, then add it to 'Protected Files' list. If you want to totally conceal a data file from all the sandboxed programs but allow read/write access by other known/trusted programs, then add it to Protected Data Folders.
So the the "unknown" file, lets say Ransomware cannot modificate or change or crypt your files in that list. Any word more than that.
 
Last edited by a moderator:

tonibalas

Level 40
Verified
Honorary Member
Top Poster
Well-known
Sep 26, 2014
2,973
COMODO is the only one who can prevent any malware (including Ransomware)
Valid reason = If the file is unknown (all new threats are borning as unknown) then it will goes into sandbox.
I couldn't vote, because Comodo is not in the list :oops:
That is my answer too. Comodo sandbox can protect you from ransomware.
At least it did that to me when i was using it;)
 
L

LabZero

Before giving an opinion specifically to the topic, IMO a few considerations.

Determining feature of the recent malware/ransomware has the ability to avoid antivirus detection.

We analyse the structure of these cyber attacks: if we click on a mail attachment or on infected web page, running a dropper that has essentially the task of communicating with a remote server to download the ransomware.
The dropper injects a process that gets information about the host system and communicates to the remote server.

In this way, the server is informed about which antivirus is running and if the version of the operating system has known exploitable vulnerabilities .
So the dropper is instructed to download a specific version of the crypto malware.
The dropper has downloaded on the machine, a version of the malware designed to circumvent our specific antivirus application, then it will be running by encrypting the file.

One of the most effective methods to work around AV protection is Process Hollowing.
The malware runs a legitimate process of Windows, but in suspended mode. At that point, it empties the memory in use by the same process and injects the payload, and in this way, the malware is run under the hat of the legitimate process and it does not allow the antivirus to detect it in any way.

Then there are methods to avoid detection within the sandbox.
For example, the ransomware detects, using techniques of increasing complexity (service discovery, registry keys, computational features of the processor, or specific instructions on the use of resources), the presence of a virtual environment, while remaining inert. The user will then consider it safe by running it outside of the protected area, triggering the actual infection.

The other technique is to create the polymorphic viruses, or use the payload that is known code but obfuscated, so avoiding detection by antivirus, also for example, by encrypting the executable with different algorithms, or by compressing it in different containers.

It is obvious how these techniques make it virtually useless the signatures based antivirus.
In my opinion, never as now, the antivirus , alone, can hardly detects all these threats.

Specifically to the topic if I have to choose an AV for the best ransomware protection, whereas, as mentioned above, I might choose Avast/Hardened Mode/Agressive setup.
Because it is free, and although nothing is perfect, it has proven in my tests against ransomware a very good performance.
But remember that all the ransomware that I've tested, however, have been detected by Smartscreen filter at double click time, often people forget that.

But a strategy of prevention must necessarily have, in addition to an effective safety products, also a backup (and restore) reliable plan. Important the education of users and implementation of security policy to mitigate the potential destructive of these malware.

Sorry for prob. OT, but I think that it is necessary to understand the problem in its entirety before giving an opinion.
 

Dirk41

Level 17
Verified
Top Poster
Well-known
Mar 17, 2016
797
Trend Micro has a feature that prevents ransomware from encrypting files in selected folders, by default this is my documents, however I have also seen Trends Feature where is detects unusual activity targeting files malware normally targets and backs those targets up, restoring them once the user allows the encryption or allows Trend to remove the threat

Interesting . Has anyone tested it? I have never seen it advertised , because , from what you said , it seems invincible if no one can encrypt a folder . Of course if you want your files encrypted to protect them from strangers, you can 't I suppose
 
Last edited:
  • Like
Reactions: shukla44

rosendalek

Level 3
Verified
Aug 16, 2016
126
Of course if you won't your files encrypted to protect them from strangers, you can 't I suppose
you can, its designed to protect against applications or files behaving in a way that looks suspicious ,but if tbe encryption is performed by a whitelisted application. Like Winzip for example, trend wont block it
 
  • Like
Reactions: shukla44 and Dirk41

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top